A. Mansour, M. Sadik, E. Sabir, and M. Jebbar, AMBAS: An Autonomous Multimodal Biometric Authentication System, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp.2098-2104, 2017.
DOI : 10.1109/IWCMC.2017.7986607

B. Fernandez-saavedra, R. Sanchez-reillo, R. Ros-gomez, and J. Liu-jimenez, Small fingerprint scanners used in mobile devices: the impact on biometric performance, IET Biometrics, vol.5, issue.1, pp.28-36, 2016.
DOI : 10.1049/iet-bmt.2015.0018

E. Marasco and A. Ross, A Survey on Antispoofing Schemes for Fingerprint Recognition Systems, ACM Computing Surveys, vol.47, issue.2, pp.28-2015
DOI : 10.1109/TPAMI.2011.161

D. F. Smith, B. C. Wiliem, and . Lovell, Face Recognition on Consumer Devices: Reflections on Replay Attacks, IEEE Transactions on Information Forensics and Security, vol.10, issue.4, pp.736-745, 2015.
DOI : 10.1109/TIFS.2015.2398819

M. Rybnicek, C. Lang-muhr, and D. Haslinger, A roadmap to continuous biometric authentication on mobile devices, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), pp.122-127, 2014.
DOI : 10.1109/IWCMC.2014.6906343

A. Mhenni, C. Rosenberger, E. Cherrier, and N. E. Amara, Keystroke template update with adapted thresholds, 2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), pp.483-488, 2016.
DOI : 10.1109/ATSIP.2016.7523122

URL : https://hal.archives-ouvertes.fr/hal-01286813

R. S. Gaines, W. Lisowski, S. J. Press, and N. Shapiro, Authentication by keystroke timing: Some preliminary results, DTIC Document, 1980.

C. Epp, M. Lippold, and R. L. Mandryk, Identifying emotional states using keystroke dynamics, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.715-724, 2011.
DOI : 10.1145/1978942.1979046

A. N. Nahin, J. M. Alam, H. Mahmud, and K. Hasan, Identifying emotion by keystroke dynamics and text pattern analysis, Behaviour & Information Technology, vol.19, issue.5, pp.987-996, 2014.
DOI : 10.1037/0022-3514.66.2.310

L. Didaci, G. L. Marcialis, and F. Roli, Analysis of unsupervised template update in biometric recognition systems, Pattern Recognition Letters, vol.37, pp.151-160, 2014.
DOI : 10.1016/j.patrec.2013.05.021

N. Poh, A. Rattani, and F. Roli, Critical analysis of adaptive biometric systems, IET Biometrics, vol.1, issue.4, pp.179-187, 2012.
DOI : 10.1049/iet-bmt.2012.0019

A. Rattani, G. L. Marcialis, and F. Roli, Biometric system adaptation by self-update and graph-based techniques, Journal of Visual Languages & Computing, vol.24, issue.1, pp.1-9, 2013.
DOI : 10.1016/j.jvlc.2012.10.004

B. Freni, G. L. Marcialis, and F. Roli, Replacement Algorithms for Fingerprint Template Update, Image Analysis and Recognition, pp.884-893, 2008.
DOI : 10.1007/978-3-540-69812-8_88

T. Scheidat, A. Makrushin, and C. Vielhauer, Automatic template update strategies for biometrics, 2007.

P. Kang, S. Hwang, and S. Cho, Continual retraining of keystroke dynamics based authenticator Advances in biometrics, pp.1203-1211, 2007.

N. Poh, J. Kittler, C. Chan, and M. Pandit, Algorithm to estimate biometric performance change over time, IET Biometrics, vol.4, issue.4, pp.236-245, 2015.
DOI : 10.1049/iet-bmt.2014.0107

G. Doddington, W. Liggett, A. Martin, M. Przybocki, and D. Reynolds, Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the nist 1998 speaker recognition evaluation, NATIONAL INST OF STANDARDS AND TECHNOLOGY GAITHERSBURG MD, 1998.

A. Ross, A. Rattani, and M. Tistarelli, Exploiting the doddington zoo effect in biometric fusion, Biometrics: Theory, Applications, and Systems, 2009. BTAS'09. IEEE 3rd International Conference on, pp.1-7, 2009.

A. Morales, J. Fierrez, and J. Ortega-garcia, Towards Predicting Good Users for Biometric Recognition Based on Keystroke Dynamics, European Conference on Computer Vision, pp.711-724, 2014.
DOI : 10.1007/978-3-319-16181-5_54

N. Houmani and S. Garcia-salicetti, On Hunting Animals of the Biometric Menagerie for Online Signature, PLOS ONE, vol.3, issue.7, p.151691, 2016.
DOI : 10.1371/journal.pone.0151691.s005

URL : https://hal.archives-ouvertes.fr/hal-01355704

R. Giot, M. El-abed, and R. Christophe, Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.11-15, 2012.
DOI : 10.1109/IIH-MSP.2012.10

URL : https://hal.archives-ouvertes.fr/hal-00714251

K. Killourhy and R. Maxion, Why did my detector do that?! " in International Workshop on Recent Advances in Intrusion Detection, pp.256-276, 2010.