[1]
S. J. M. D. S. D., “Review Paper on Various Methods of Implicit Authentication”, IJRITCC, vol. 3, no. 5, pp. 3064–3066, May 2015.