1. Achieving flatness from non-realistic honeywords;Akshaya,2017
2. Optimal distributed password verification;Camenisch,2015
3. Generation of secure and reliable honeywords, preventing false detection;Chang;IEEE Trans. Dependable Secure Comput.,2018
4. Introduction to Graph Theory;Chartrand,2006
5. Cimpanu C.. A hacker has dumped nearly one billion user records over the past two months. 2019 https://www.zdnet.com/article/a-hacker-has-dumped-nearly-one-billion-user-records-over-the -past-two-months/.