Ahn, C., Lee, S., & Kim, H. (2022). MFA effectiveness
against phishing attacks: An empirical evaluation.
Computers & Security, 118, 102725. https://doi.org
/10.1016/j.cose.2022.102725
Alotaibi, F., & Furnell, S. (2021). Usability challenges in
multi-factor authentication systems. Information and
Computer Security, 29(4), 604– 620. https://doi.org/
10.1108/ICS-04-2021-0067
Anderson, B., & Flores, W. (2021). Strengthening
enterprise cybersecurity through adaptive MFA
policies. International Journal of Information Security
Science, 10(3), 55– 68. https://doi.org/10.1016/j.ijiss
.2021.03.005
Banik, M., Sarkar, S., & Pal, S. (2023). Secure
authentication models for IoT devices using MFA.
IEEE Internet of Things Journal, 10(8), 6754–6765.
https://doi.org/10.1109/JIOT.2023.3245556
Barni, M., & Dini, G. (2022). Advancements in biometric
authentication for MFA frameworks. IEEE
Transactions on Dependable and Secure Computing,
19(5), 2760– 2773. https://doi.org/10.1109/TDSC.20
21.3109346
Bhargava, B., & Wu, J. (2021). Reducing phishing risks
through MFA implementation. ACM Computing
Surveys, 54(9), 1–36. https://doi.org/10.1145/3477121
Bukhari, S. F. A., & Salah, K. (2022). Blockchain-assisted
MFA: Trends and future directions. IEEE Access, 10,
16545– 16561. https://doi.org/10.1109/ACCESS.2022
.3148865
Cai, Z., & He, Y. (2024). Behavioral biometrics in MFA for
mobile security. Journal of Network and Computer
Applications, 224, 103945. https://doi.org/10.1016/j.
jnca.2024.103945
Chatterjee, S., & De, S. (2022). Hybrid multi-factor
authentication for cloud platforms. Future Generation
Computer Systems, 132, 34– 48. https://doi.org/10.1
016/j.future.2022.01.002
Duan, J., Wang, J., & Ren, K. (2021). Analyzing MFA in
defending against credential stuffing attacks. IEEE
Transactions on Information Forensics and Security,
16, 5120– 5133. https://doi.org/10.1109/TIFS.2021.3
113052
Farooq, M., & Alshamrani, A. (2023). MFA in
cybersecurity compliance frameworks: A critical
review. Computers & Security, 128, 102755.
https://doi.org/10.1016/j.cose.2023.102755
Ferreira, A., & Antunes, L. (2021). Improving user
experience in MFA: Balancing security and usability.
Information Security Journal: A Global Perspective,
30(3), 105–116.
https://doi.org/10.1080/19393555.2021.1922203
Gao, J., & Liu, Y. (2022). Comparative study on MFA
technologies for mobile banking security. IEEE
Transactions on Mobile Computing, 21(6), 2022–2036.
https://doi.org/10.1109/TMC.2021.3119257
Ghorbani, A. A., & Salah, K. (2021). MFA as a service:
Opportunities and challenges. IEEE Internet
Computing, 25(1), 70– 77. https://doi.org/10.1109/M
IC.2020.3039137
Hong, S., & Kim, H. (2023). Quantum-resistant MFA
systems: Next-generation cybersecurity. IEEE
Transactions on Quantum Engineering, 4, 1–13.
https://doi.org/10.1109/TQE.2023.3230214
Hussain, R., & Sohail, H. (2022). Machine learning
approaches for adaptive MFA. Applied Sciences, 12(9),
4562. https://doi.org/10.3390/app12094562
Jang, H., & Kim, S. (2024). MFA against deepfake-based
identity threats. IEEE Transactions on Emerging
Topics in Computing, 12(1), 156– 167. https://doi.o
rg/10.1109/TETC.2023.3295401
Li, L., & Xu, Y. (2021). Authentication resilience: The role
of MFA in cyber resilience frameworks. International
Journal of Information Management, 58, 102322.
https://doi.org/10.1016/j.ijinfomgt.2020.102322
Liu, Q., Zhang, X., & Li, W. (2022). Smart MFA systems:
Integrating AI in authentication frameworks. IEEE
Systems Journal, 16(3), 3957– 3968. https://doi.org/
10.1109/JSYST.2021.3051234
Malik, H., & Rizvi, S. (2022). Policy implications of MFA
adoption in critical infrastructure. Government
Information Quarterly, 39(2), 101670. https://doi.or
g/10.1016/j.giq.2021.101670
Park, S., & Kim, Y. (2023). Biometric MFA: Challenges
and future prospects. Sensors, 23(2), 512.
https://doi.org/10.3390/s23020512
Saleh, M., & AlZain, M. (2024). MFA adoption barriers in
healthcare cybersecurity frameworks. Health and
Technology, 14(2), 431– 442. https://doi.org/10.
1007/s12553-024-00729-x
Tan, K., & Lim, J. (2021). A novel OTP generation scheme
for secure MFA systems. Security and Communication
Networks, 2021, 5567993. https://doi.org/10.1155/2
021/5567993
Zhao, Z., & Zhang, X. (2023). The evolution of MFA
technologies in response to cyber threats. Computer
Standards & Interfaces, 86, 103673. https://doi.org/
10.1016/j.csi.2022.103673