1. Wang, X., et al.: Attacks and defenses in user authentication systems: a survey. J. Netw. Comput. Appl. 188 (2021)
2. Awad, M., et al.: Password security: password behavior analysis at a small university. In: 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), pp. 1–4. IEEE, Khaimah, United Arab Emirates (2016)
3. IBM Cost of a Data Breach Report 2023. https://www.ibm.com/reports/data-breach. Accessed 20 Mar 2024
4. Newlin Rajkumar, M., Dhurka, V., Kayathri, P.: Survey a secured privacy authentication with recovery. World Sci. News 37, 265–278 (2016)
5. Identity Attacks that Exploit Your Broken Authentication. https://www.okta.com/resources/whitepaper/5-identity-attacks-that-exploit-your-broken-authentication. Accessed 25 Mar 2024