1. Ali, T., & Ghafoor, A. (2019). A hybrid approach for detecting and mitigating reverse brute force attacks. In 2019 International Conference on Computing and Communication Technologies (ICCCT) (pp. 1-6). IEEE.
2. Al-musawi, B. Q. M. (2012). Preventing Brute Force Attack Through The Analyzing Log. Iraqi Journal of Science, 53(3), 663–667.
3. Ayankoya, F. (2019). Brute-Force Attack Prevention in Cloud Computing Using One-Time Password and Cryptographic Hash Function. International Journal of Computer Science and Information Security, 17(2), 7–19.
4. Chen, S. Y., Yoo, S., Fang, Y. L., & Initiative, C. S. (2020). Quantum Long Short-Term Memory. ArXiv.Org, 1, 1–27.
5. Gauri, M., & R.Y, I. (2018). A Review on Maintaining Web Applications and Brute Force Attack. International Research Journal Of Multidisciplinary Studies Special Issue On Advancement In Field Of Computer Science And Information Technology, 4(8), 1–8.