1. 4iQ. 2020. Weaponized Data Breaches: Fueling Identity-based Attacks Across the Globe. https://https://4iq.com/2020-identity-breach-report/. 4iQ. 2020. Weaponized Data Breaches: Fueling Identity-based Attacks Across the Globe. https://https://4iq.com/2020-identity-breach-report/.
2. Susan Antilla. 2015. Is Vanguard Making It Too Easy for Cybercriminals to Access Your Account? https://www.thestreet.com/opinion/is-vanguard-making-it-too-easy-for-cybercriminals-to-access-your-account-13213265. Susan Antilla. 2015. Is Vanguard Making It Too Easy for Cybercriminals to Access Your Account? https://www.thestreet.com/opinion/is-vanguard-making-it-too-easy-for-cybercriminals-to-access-your-account-13213265.
3. Bijeeta Pal. 2019. Password Similarity Models using Neural Networks. https://github.com/Bijeeta/credtweak/tree/master/credTweakAttack. Bijeeta Pal. 2019. Password Similarity Models using Neural Networks. https://github.com/Bijeeta/credtweak/tree/master/credTweakAttack.
4. Making More Extensive and Efficient Typo-Tolerant Password Checkers
5. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes