1. S. Ibrokhimov, K. L. Hui, A. A. Al-Absi, M. Sain, Multi-factor authentication in cyber physical system: A state of art survey. In 2019 21st international conference on advanced communication technology (ICACT), pages 279–284. IEEE, 2019.
2. A Pattern-Based Multi-Factor Authentication System
3. A Novel Multi-Factor Authentication Algorithm Based on Image Recognition and User Established Relations
4. Vermeulen K, Gurmericliler E, Cunha Í, Internet scale reverse traceroute[C]//Proceedings of the 22nd ACM Internet Measurement Conference. 2022: 694-715.
5. Q. Lone, M. Luckie, M. Korczyński, and M. Van Eeten. Using loops observed in traceroute to infer the ability to spoof. In Passive and Active Measurement: 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings 18, pages 229–241. Springer, 2017.