1. Ali Abd El-rhman, W. (2022). The linguistic synonymy phenomenon of Coptic words and their Greek equivalent through the published Coptic documents. College of Archeology Journal Cairo University, 12(2022), 137-149. https://doi.org/10.21608/jarch.2022.212059
2. Alsuhibany, S. A., & Almuqbil, A. S. (2022). Impact of using different-sized touch keyboards on free-text keystroke dynamics authentication in the Arabic language. Sci Rep, 12(1), 15866. https://doi.org/10.1038/s41598-022-20099-6
3. Anusas-Amornkul, T. (2019). Strengthening password authentication using keystroke dynamics and smartphone sensors. Proceedings of the 9th International Conference on Information Communication and Management,
4. Borgaonkar, A., Salunke, A., Gupta, N., & Sharma, V. (2017). User Authentication Through Keystroke Dynamics Using KNN. Journal of Multidisciplinary Engineering Sci-ence and Technology (JMEST), 5(4), 367-397.
5. Chintalapudi, S. R., Garapati, S. S. V., Kumar, A. D. P., & Ram, K. S. S. (2020). A Machine Learning Approach for User Identification using Keystroke Dynamics. Journal of emerging technologies and innovative research.
6. DeLong, K. A., Trott, S., & Kutas, M. (2023). Offline dominance and zeugmatic similarity normings of variably ambiguous words assessed against a neural language model (BERT). Behavior Research Methods, 55(4), 1537-1557. https://doi.org/10.3758/s13428-022-01869-6
7. Dwivedi, C., Kalra, D., Naidu, D., & Aggarwal, S. (2018). Keystroke dynamics based biometric authentication: A hybrid classifier approach. 2018 IEEE symposium series on computational intelligence (SSCI),
8. Gabralla, L. A. (2020). Dense Deep Neural Network Architecture for Keystroke Dynamics Authentication in Mobile Phone. Adv. Sci. Technol. Eng. Syst. J, 5(6), 307-314.
9. Gu, Y., Wang, Y., Wang, M., Pan, Z., Hu, Z., Liu, Z., Shi, F., & Dong, M. (2021). Secure user authentication leveraging keystroke dynamics via wi-fi sensing. IEEE Transactions on Industrial Informatics, 18(4), 2784-2795.
10. Hussein, B. (2023). Interference of Linguistic Research Approaches. Islamic Sciences Journal, 11(8), 1-14. https://doi.org/10.25130/jis.20.11.8.1
11. Kochegurova, E., & Zateev, R. (2022). Hidden Monitoring Based on Keystroke Dynamics in Online Examination System. Programming and Computer Software, 48(6), 385-398.
12. Li, J., Chang, H.-C., & Stamp, M. (2022). Free-text keystroke dynamics for user authentication. In Artificial Intelligence for Cybersecurity (pp. 357-380). Springer.
13. Negi, A., Rathore, S. S., & Sadhya, D. (2021). USB Keypress Injection Attack Detection via Free-Text Keystroke Dynamics. 2021 8th International Conference on Signal Processing and Integrated Networks (SPIN),
14. Nisa Anggraini, B., & Dwi, W. (2022). Language Kinship of English, German, and Dutch: A Comparative Historical Linguistic Study. International Journal Of Humanities Education and Social Sciences (IJHESS), 1(6). https://doi.org/10.55227/ijhess.v1i6.189
15. Praise Chukwunalu, Y., Nwankwere, A. U. N., Orji, D. A., & Shah, M. (2022). A Study of Language Use Impact in Radio Broadcasting: A Linguistic and Big Data Integration Approach. Journal of Sensors, 2022, 1440935. https://doi.org/10.1155/2022/1440935
16. Rathi, M., & Kumar, A. V. S. (2019). Euler Movement Firefly Algorithm and Fuzzy Kernel Support Vector Machine Classifier for Keystroke Authentication. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(11). https://doi.org/10.35940/ijitee.K2063.0981119
17. S Zeid, S., A ElKamar, R., & I Hassan, S. (2022). Fixed-Text vs. Free-Text Keystroke Dynamics for User Authentication. Engineering Research Journal-Faculty of Engineering (Shoubra), 51(1), 95-104.
18. Saini, B. S., Kaur, N., & Bhatia, K. S. (2019). Position independent mobile user authentication using keystroke dynamics. In Hidden Link Prediction in Stochastic Social Networks (pp. 64-78). IGI Global.
19. Saini, B. S., Singh, P., Nayyar, A., Kaur, N., Bhatia, K. S., El-Sappagh, S., & Hu, J.-W. (2020). A three-step authentication model for mobile phone user using keystroke dynamics. IEEE Access, 8, 125909-125922.
20. Setiawan, I. (2022). Language Kinship as Regional Conflict Resolution in West Nusa Tenggara: Comparative Historical Linguistic Study. REiLA : Journal of Research and Innovation in Language, 4(1), 82-100. https://doi.org/10.31849/reila.v4i1.9579
21. Wang, X., Shi, Y., Zheng, K., Zhang, Y., Hong, W., & Cao, S. (2022). User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes. Sensors, 22(17), 6627. https://www.mdpi.com/1424-8220/22/17/6627
22. Wu, T., Zheng, K., Xu, G., Wu, C., & Wang, X. (2019). User identification by keystroke dynamics using improved binary particle swarm optimisation. International Journal of Bio-Inspired Computation, 14(3), 171-180.