1. Cheswick, W. (ACM Queue, 2012). Rethinking Passwords, ACM Queue, Archived from the original on 2019-11-03.
2. le Bras, T. (2015, July 21). Online Overload—It’s Worse Than You Thought. Available online: https://blog.dashlane.com/infographic-online-overload-its-worse-than-you-thought/.
3. Security and Understanding Techniques for Visual CAPTCHA Interpretation;Xhafa;Advances on P2P, Parallel, Grid, Cloud and Internet Computing, Lecture Notes on Data Engineering and Communications Technologies,2018
4. Stainbrook, M., and Caporusso, N. (2019). Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, 21–25 July 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, FL, USA, Springer International Publishing.
5. Krzyworzeka, N., Ogiela, L., and Ogiela, M.R. (2021). Cognitive Based Authentication Protocol for Distributed Data and Web Technologies. Sensors, 21.