1. Password security: Password behavior analysis at a small university;Awad,2016
2. Authentication systems: A literature review and classification;Barkadehi;Telematics and Informatics,2018
3. Belding, G., 2018. What are honeywords? password protection for database breaches. https://resources.infosecinstitute.com/topic/what-are-honeywords-password-protection-for-database-breaches/.
4. United States Federal Employees’ Password Management Behaviors: A Department of Commerce Case Study;Choong,2014
5. Achieving flatness: Selecting the honeywords from existing user passwords;Erguler;IEEE Transactions on Dependable and Secure Computing,2015