Artificial Intelligence and Advanced Cybersecurity to Mitigate Credential-Stuffing Attacks in the Banking Industry

Authors

DOI:

https://doi.org/10.22399/ijcesen.754

Keywords:

Credential-Stuffing, Machine learning, Stolen credentials, User behaviour analytics, Adaptive authentication, AI

Abstract

Credential-stuffing attacks pose a critical threat to the banking sector, leveraging stolen login credentials to compromise user accounts and inflict substantial financial and reputational damage. Traditional security measures, including Multi-Factor Authentication (MFA) and CAPTCHA, often fall short against the sophistication of these attacks, necessitating more advanced and proactive defense strategies.

This study explores the transformative role of artificial intelligence (AI) and machine learning (ML) in cybersecurity, particularly in mitigating credential-stuffing threats. AI-driven solutions enable real-time threat detection, predictive analysis, and adaptive authentication, providing enhanced protection by analyzing large datasets to identify unusual login patterns and behaviors. Despite their promise, AI and ML adoption in cybersecurity faces challenges, including data privacy concerns, the risk of false positives and negatives, and scalability barriers. This research also examines emerging technologies, such as federated learning and blockchain-based authentication, which offer decentralized and privacy-preserving approaches to combating credential-stuffing attacks. Ultimately, AI and ML present the banking sector with powerful tools to build resilient, adaptable, and efficient defenses against evolving cyber threats. By integrating these technologies with complementary innovations, financial institutions can enhance security, protect customer trust, and address the dynamic landscape of credential-based cyberattacks.

References

HHS Cybersecurity Program. (2019). Credential stuffing. https://www.hhs.gov/sites/default/files/credential-stuffing.pdf

Security Intelligence. (2021). The state of credential stuffing attacks. https://securityintelligence.com/articles/credential-stuffing-attacks-2021/

N. K., et al. (2023). AI in cybersecurity: Threat detection and response with machine learning. Tuijin Jishu/Journal of Propulsion Technology, 44(3), 38–46. https://doi.org/10.52783/tjjpt.v44.i3.237

Auth0. (2020). Credential stuffing attacks: What are they and how to combat them. https://assets.ctfassets.net/2ntc334xpx65/5ooYXF36tG52EfKLvrbyvm/f6d40b276754186b14d394ddf9bf5d59/Credential_Stuffing_Attacks_2-v1.pdf

Patel, P., Goswami, P., Mishra, A., Khan, S., & Choudhary, A. (2021). Brute force, dictionary and rainbow table attack on hashed passwords. International Journal of Creative Research Thoughts (IJCRT, 9(4). https://ijcrt.org/papers/IJCRT2104242.pdf

Barkworth, A., Tabassum, R., & Lashkari, A. (2023). Detecting IMAP credential stuffing bots using behavioural biometrics. ACM Digital Library. https://doi.org/10.1145/3586102.3586104

Kirkbride, P. (2020). OpenBullet: Credential stuffing for script kiddies and career criminals. International Journal of Scientific & Technology Research, 9(1). https://www.ijstr.org/final-print/mar2020/Openbullet-Credential-Stuffing-For-Script-Kiddies-And-Career-Criminals.pdf

Nimmo, B., Agranovich, D., & Gleicher, N. (2022). Adversarial threat report: Purpose of this report. Meta. https://about.fb.com/wp-content/uploads/2022/04/Meta-Quarterly-Adversarial-Threat-Report_Q1-2022.pdf

Smalley, S. (2024, February 7). Google agrees to $350 million settlement over data leak. The Record. https://therecord.media/google-agrees-to-settle-data-leak

Bajak, F. (2024, February 2). Microsoft says state-backed Russian hackers accessed emails of senior leadership team members. AP News. https://apnews.com/article/microsoft-russian-hackers-email-breach-sec-rule-84610492e56778767116a3f89f7ff658

Kron, E. (2021). The human problem behind credential theft and reuse. Cyber Security: A Peer-Reviewed Journal, 4(3), 223. https://doi.org/10.69554/NHDY5855

Muller, M. (2019). Coinbase security: Now protecting your Coinbase account in more places. Coinbase. https://www.coinbase.com/blog/coinbase-security-now-protecting-your-coinbase-account-in-more-places

Mueller, N. (n.d.). Credential stuffing software attack. OWASP Foundation. https://owasp.org/www-community/attacks/Credential_stuffing

Communications Security Establishment. (2022). Strategies for protecting web application systems against credential stuffing attacks. https://www.cyber.gc.ca/sites/default/files/cyber/2022-01/ITSP-30-035-Strategies-for-protecting-against-credential-stuffing-attacks_e.pdf

Manankova, O. A., Yakubova, M. Z., Rakhmatullaev, M. A., & Baikenov, A. S. (2023). Simulation of the rainbow attack on the SHA-256 hash function. Journal of Theoretical and Applied Information Technology, 28(4). https://www.jatit.org/volumes/Vol101No4/36Vol101No4.pdf

F5. (2015, January 21). Attack tool on the rise: Account checker. https://www.f5.com/company/blog/attack-tool-on-the-rise-account-checker

IC3. (2022). Proxies and configurations used for credential stuffing attacks on online customer accounts. Internet Crime Complaint Center (IC3). https://www.ic3.gov/CSA/2022/220818.pdf

Verizon Enterprise Solutions. (2019). 2019 data breach investigations report. https://www.key4biz.it/wp-content/uploads/2019/05/2019-data-breach-investigations-report.pdf

Kumari, M., Sinha, P. C., & Priya, S. (2014). The impact of data breaches on consumer trust in e-commerce. International Journal of Computer Science Publication (IJCSP). https://rjpn.org/ijcspub/papers/IJCSP14D1001.pdf

Merchant Risk Council. (2021). Top 10 North American bank eliminates credential stuffing. Merchant Risk Council. https://merchantriskcouncil.org/learning/resource-center/fraud/attack-types/top-10-north-american-bank-eliminates-credential-stuffing

Kaspersky Lab. (2015). Damage control: The cost of security breaches. https://media.kaspersky.com/pdf/it-risks-survey-report-cost-of-security-breaches.pdf

DOT Security. (2024). SIM swapping: How hackers beat multi-factor authentication. DOT Security. https://dotsecurity.com/insights/blog-sim-swapping-attacks

Dayanand, W. Jeberson, & Jeberson, K. (2024). Attack vectors and vulnerabilities: Investigating the methodologies employed by attackers to bypass CAPTCHA mechanisms, including machine learning-based algorithms, optical character recognition (OCR) techniques, and adversarial attacks. International Research Journal of Multidisciplinary Scope, 5(3). https://doi.org/10.47857/irjms.2024.v05i03.0828

Ezugwu, A., et al. (2023). Password-based authentication and the experiences of end users. Scientific African, 21. https://doi.org/10.1016/j.sciaf.2023.e01743

Yogeshwari, Kumudavalli, K., Aruna Devi, A., & Srivatsala, K. (2024). Transitioning from reactive to proactive cybersecurity using machine learning. International Research Journal on Advanced Engineering and Management (IRJAEM, 2(8).

NPCore. (2024). The limitations of multi-factor authentication (MFA): 2024 NPCore monthly technical white paper. https://www.npcore.com/upload/2024-08-14_17_17_38c4f0f59efb7945dbaf6773df6f21b544.pdf

Wadhwa, M., Prasad, B. K., Ranjan, S., & Kathuria, M. (2020). CAPTCHA bypass and prevention mechanisms: A review. International Organization of Scientific Research Journal of Computer Engineering, 22(3), 23–29. https://www.iosrjournals.org/iosr-jce/papers/Vol22-issue3/Series-4/D2203042329.pdf

Arya, S., Arya, S., Arya, M., & Arya, J. S. (2023). Enhancing IoT security and user experience: Leveraging SGIoT-SURE for effective security implementations. 2023 IEEE 14th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON, 224–229. https://doi.org/10.1109/UEMCON59035.2023.10316161

Shah, V. (2022, December). Machine learning algorithms for cybersecurity: Detecting and preventing threats. ResearchGate. https://www.researchgate.net/publication/378396020_Machine_Learning_Algorithms_for_Cybersecurity_Detecting_and_Preventing_Threats

Thawait, N. K. (2024). Enhancing cybersecurity through machine learning applications: A comprehensive study. Preprints. https://doi.org/10.20944/preprints202411.0390.v1

Thawait, N. K. (2024, May). Machine learning in cybersecurity: Applications, challenges and future directions. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 10(3), 16–27. https://doi.org/10.32628/CSEIT24102125

Rees-Pullman, S. (2020, July). Is credential stuffing the new phishing? Computer Fraud & Security, 2020(7), 16–19. https://doi.org/10.1016/S1361-3723(20)30076-2

Thomas, K., Pullman, J., Yeo, K., Raghunathan, A., Kelley, P. G., Invernizzi, L., Benko, B., Pietraszek, T., Patel, S., Boneh, D., & Bursztein, E. (2019). Protecting accounts from credential stuffing with password breach alerting. USENIX Security Symposium.

Pal, B., Daniel, T., Chatterjee, R., & Ristenpart, T. (n.d.). Beyond credential stuffing: Password similarity models using neural networks. Cornell Tech. https://www.cs.cornell.edu/~rahul/papers/ppsm.pdf

Konduru, S. S., & Mishra, S. (2023). Detection of password reuse and credential stuffing: A server-side approach. Shiv Nadar Institution of Eminence. https://eprint.iacr.org/2023/989.pdf

Wang, K. C., & Reiter, M. K. (2019). Detecting stuffing of a user's credentials at her own accounts. ResearchGate. https://www.researchgate.net/publication/338158173_Detecting_stuffing_of_a_user's_credentials_at_her_own_accounts

Zhang, Q. (2021). Detecting credential stuffing between servers. In Security, Privacy, and Anonymity in Computation, Communication, and Storage (pp. 492–506). Springer. https://doi.org/10.1007/978-3-030-68884-4_38

Nguyen Ba, M. H., Bennett, J., Gallagher, M., & Bhunia, S. (2021). A case study of credential stuffing attack: Canva data breach. 2021 International Conference on Computational Science and Computational Intelligence (CSCI), 735–740. https://doi.org/10.1109/CSCI54926.2021.00187

Kamoun, F., Iqbal, F., Esseghir, M. A., & Baker, T. (2020). AI and machine learning: A mixed blessing for cybersecurity. 2020 International Symposium on Networks, Computers and Communications (ISNCC), 1–7.

Singer, Y. (2024). AI & machine learning in cybersecurity.

Nassif, A. B., Talib, M. A., Nasir, Q., & Dakalbab, F. M. (2021). Machine learning for anomaly detection: A systematic review. IEEE Access, 9, 78658–78700. https://doi.org/10.1109/ACCESS.2021.3083060

Basak, S., Chatterjee, P., Biswas, D., Bhadra, P., & Das, R. (2024). Introduction to AI and ML technologies and their potential applications in cybersecurity. Advances in Web Technologies and Engineering, 277–309. https://doi.org/10.4018/979-8-3693-6557-1.ch012

Dokur, N. B. (2023). Artificial intelligence (AI) applications in cyber security. https://www.researchgate.net/publication/367253331_Artificial_Intelligence_AI_Applications_in_Cyber_Security

Usman, U. B., Mohammed, A., Ali, U., Habu, A., & Others. (2023). An overview of artificial intelligence in cybersecurity: Opportunities and challenges. https://www.researchgate.net/publication/375497186

Chen, Z., Duan, J., Kang, L., & Qiu, G. (2022). Supervised anomaly detection via conditional generative adversarial network and ensemble active learning. IEEE Transactions on Pattern Analysis and Machine Intelligence, PP(99). https://doi.org/10.1109/TPAMI.2022.3225476

Xin, Y., Zhang, X., Li, Y., Chen, L., & Liu, J. (2018). Machine learning and deep learning methods for cybersecurity. IEEE Access, 6, 35365-35381. https://doi.org/10.1109/ACCESS.2018.2836950

Kim, J., Song, M., Seo, M., Jin, Y., & Shin, S. (2024). PassREfinder: Credential stuffing risk prediction by representing password reuse between websites on a graph. In 2024 IEEE Symposium on Security and Privacy (SP) (pp. 1385-1404). IEEE. https://doi.org/10.1109/SP54263.2024.00020

Saxena, S. (2022). Credential stuffing attack: Countermeasures using patterns and machine learning. International Research Journal of Engineering and Technology (IRJET), 9(9). https://www.irjet.net

Ahmad, I., Basheri, M., Iqbal, M. J., & Rahim, A. (2018). Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access, 6, 33789–33795. https://doi.org/10.1109/ACCESS.2018.2841987

Pal, B. (2014). Support vector machine and random forest modeling for intrusion detection system (IDS). Journal of Intelligent Learning Systems and Applications, 6(1).

Bierbrauer, D., Chang, A., Kritzer, W., & Bastian, N. (2021, November). Cybersecurity anomaly detection in adversarial environments. https://www.researchgate.net/publication/351624397_Cybersecurity_Anomaly_Detection_in_Adversarial_Environments

El Hairach, M. L., Bellamine, I., & Tmiri, A. (2023, December). Anomaly detection in PV modules: A comparative study of DBSCAN, k-means, Isolation Forest, and LOF. In 2023 7th IEEE Congress on Information Science and Technology (CiSt). IEEE.

A CNN-LSTM hybrid model. (2021). Journal of Cybersecurity and Privacy, 7(4), 123-134.

Kim, J., & Lee, S. (2020). Sequential pattern recognition for cybersecurity: LSTM-based attack detection. IEEE Transactions on Neural Networks and Learning Systems, 31(8), 3056-3068.

Liu, H., Li, Z., & Zhang, X. (2019). Semi-supervised learning for credential-stuffing detection with limited labeled data. International Journal of Cybersecurity, 15(3), 213-225

Zhao, F., & Xu, J. (2020). Leveraging unlabeled data in semi-supervised models for fraud detection. Journal of Machine Learning Research, 21(49), 1-22.

Afolabi, O. (2024). Using reinforcement learning for adaptive security protocols. https://www.researchgate.net/publication/384608149_USING_REINFORCEMENT_LEARNING_FOR_ADAPTIVE_SECURITY_PROTOCOLS

Boahen, E. K., Sosu, R. N. A., Ocansey, S. K., Xu, Q., & Wang, C. (2024). ASRL: Adaptive Swarm Reinforcement Learning for enhanced OSN intrusion detection. IEEE Transactions on Information Forensics and Security, 19, 10258–10272. https://ieeexplore.ieee.org/document/10741305

Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., ... & Vasilakos, A. V. (2018). Machine learning and deep learning methods for cybersecurity. IEEE Access, 6, 35365–35381.

Kim, J., Song, M., Seo, M., Jin, Y., & Shin, S. (2024). PassREfinder: Credential stuffing risk prediction by representing password reuse between websites on a graph. *2024 IEEE Symposium on Security and Privacy (SP)*, 1385–1404.

Kamoun, F., Iqbal, F., Esseghir, M.A., & Baker, T. (2020). AI and machine learning: A mixed blessing for cybersecurity. 2020 International Symposium on Networks, Computers and Communications (ISNCC), 1-7.

Nguyen Ba, M. H., Bennett, J., Gallagher, M., & Bhunia, S. (2021). A case study of credential stuffing attack: Canva data breach. 2021 International Conference on Computational Science and Computational Intelligence (CSCI), 735–740.

hapliyal, V., & Thapliyal, P. (2024). Machine learning for cybersecurity: Threat detection, prevention, and response. Digital Intelligence Research Applications, 12(1).

Arkose Labs. (n.d.). Credential stuffing attacks: What they are and how to prevent them. https://www.arkoselabs.com/credential-stuffing/credential-stuffing-attacks/

Aminu, M., Akinsanya, A., Oyedokun, O., & Dako, A. (2024). Enhancing cyber threat detection through real-time threat intelligence and adaptive defense mechanisms. International Journal of Computer Applications Technology and Research, 13(08), 11-27.

Zhou, Y., & Chen, X. (2022). Real-time detection of compromised credentials in credential stuffing attacks. International Journal of Information Security, 21(5), 649-664.

Incyber. (2024). Predictive analytics in cybersecurity: Myth or reality? INCYBER NEWS. https://incyber.org/en/

MIT News. (2016, April 18). AI system predicts 85 percent of cyberattacks using input from human experts. MIT. https://news.mit.edu/2016/ai-system-predicts-85-percent-cyber-attacks-using-input-human-experts-0418

Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. Proceedings of the 2010 IEEE Symposium on Security and Privacy, 305-320.

Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys (CSUR), 41(3), 1-58.

Shabtai, A., Moskovitch, R., Elovici, Y., & Glezer, C. (2012). Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Information Security Technical Report, 14(1), 16–29. https://doi.org/10.1016/j.istr.2009.03.003

Wei, J., Peng, W., Luo, J., & Wang, Y. (2020). Adaptive multi-factor authentication system based on contextual data. Future Generation Computer Systems, 108, 715–728. https://doi.org/10.1016/j.future.2020.03.032

Das, A., Bonneau, J., Caesar, M., Borisov, N., & Wang, X. (2014). The tangled web of password reuse. Proceedings of NDSS. https://www.ndss-symposium.org/ndss2014/tangled-web-password-reuse

Anderson, R. J., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610–613. https://doi.org/10.1126/science.1130992

Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31. https://doi.org/10.1016/j.jnca.2015.11.016

Zou, D., Tuo, J., Hao, F., Li, B., & Chen, H. (2020). Building anomaly detection systems with active learning: A comparative study. Computers & Security, 93, 101748. https://doi.org/10.1016/j.cose.2020.101748

Radford, A., Narasimhan, K., Salimans, T., & Sutskever, I. (2018). Improving language understanding by generative pretraining. OpenAI Technical Report. https://cdn.openai.com/research-covers/language-unsupervised/language_understanding_paper.pdf

Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79, 119.

European Parliament & Council of the European Union. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Official Journal of the European Union, L 119, 1-88.

Tene, O., & Polonetsky, J. (2012). Privacy in the age of big data: A time for big decisions. Stanford Law Review Online, 64, 63–69.

Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. 2010 IEEE Symposium on Security and Privacy (SP), 305–316. https://doi.org/10.1109/SP.2010.25

Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31. https://doi.org/10.1016/j.jnca.2015.11.016

Zou, D., Tuo, J., Hao, F., Li, B., & Chen, H. (2020). Building anomaly detection systems with active learning: A comparative study. Computers & Security, 93, 101748. https://doi.org/10.1016/j.cose.2020.101748

Anderson, R. J., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610–613. https://doi.org/10.1126/science.1130992

Kairouz, P., McMahan, H. B., Avent, B., Bellet, A., Bennis, M., Bhagoji, A. N., ... & Zhao, S. (2021). Advances and open problems in federated learning. Foundations and Trends® in Machine Learning, 14(1–2), 1-210. https://doi.org/10.1561/2200000083

Wei, J., Peng, W., Luo, J., & Wang, Y. (2020). Adaptive multi-factor authentication system based on contextual data. Future Generation Computer Systems, 108, 715–728. https://doi.org/10.1016/j.future.2020.02.014

Shabtai, A., Moskovitch, R., Elovici, Y., & Glezer, C. (2009). Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Inf. Secur. Tech. Rep., 14, 16-29.

McMahan, B., Moore, E., Ramage, D., Hampson, S., & Arcas, B. A. Y. (2017). Communication-efficient learning of deep networks from decentralized data. Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, PMLR 54, 1273-1282. https://proceedings.mlr.press/v54/mcmahan17a.html

Kairouz, P., McMahan, H. B., Avent, B., Bellet, A., Bennis, M., Bhagoji, A. N., Bonawit, K., Charles, Z., Cormode, G., Cummings, R., D’Oliveira, R. G. L., Eichner, H., El Rouayheb, S., Evans, D., Gardner, J., Garrett, Z., Gascón, A., Ghazi, B., Gibbons, P. B., ... Zhao, S. (2021). Advances and open problems in federated learning. https://ieeexplore.ieee.org/document/9464278

Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf

Böhme, R., Christin, N., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, technology, and governance. Journal of Economic Perspectives, 29(2), 213–238

Ndung'u, R. N. (2022). Blockchain as a solution of information security and data privacy issues: Review. International Journal of Computer Applications Technology and Research, 11(08), 337–340.

Kasula, V. K., Kumar, S., & Reddy, A. R. (2023). Fortifying cloud environments against data breaches: A novel AI-driven security framework. ResearchGate. Retrieved from https://www.researchgate.net/publication/385213953_Fortifying_cloud_environments_against_data_breaches_A_novel_AI-driven_security_framework

Advanced AI Authentication Mechanisms for Securing Financial Services. (2023). International Journal of Advanced Engineering and Management, 10(3), 45–53.

Li, J., Meng, Y., Ma, L., Du, S., Zhu, H., & Pei, Q. (2021). A federated learning based privacy-preserving smart healthcare system. IEEE Transactions on Industrial Informatics, 17(9), 6530–6541.

Lemley, M. A., & Volokh, E. (2019). Law, virtual reality, and augmented reality. UCLA Law Review, 66, 1032–1085.

Anakal, S., K. Krishna Prasad, Chandrashekhar Uppin, & M. Dileep Kumar. (2025). Diagnosis, visualisation and analysis of COVID-19 using Machine learning. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.826

J. Prakash, R. Swathiramya, G. Balambigai, R. Menaha, & J.S. Abhirami. (2024). AI-Driven Real-Time Feedback System for Enhanced Student Support: Leveraging Sentiment Analysis and Machine Learning Algorithms. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.780

S. Lakshminarayanan and J. Konidhala, (2024). CONVOLUTIONAL NEURAL NETWORK FOR POTHOLE IDENTIFICATION IN URBAN ROADS”, IJASIS, 10(1);1–12, doi: 10.29284/ijasis.10.1.2024.1-12.

K. Tamilselvan, , M. N. S., A. Saranya, D. Abdul Jaleel, Er. Tatiraju V. Rajani Kanth, & S.D. Govardhan. (2025). Optimizing data processing in big data systems using hybrid machine learning techniques. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.936

Ponugoti Kalpana, L. Smitha, Dasari Madhavi, Shaik Abdul Nabi, G. Kalpana, & Kodati , S. (2024). A Smart Irrigation System Using the IoT and Advanced Machine Learning Model: A Systematic Literature Review. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.526

K. Machap and S. R. Narani, (2024). IOT AUDIO SENSOR NETWORKS AND DECISION TREES FOR ENHANCED RAIN SOUND CLASSIFICATION, IJASIS, 10(1);35–44, Jun. doi: 10.29284/ijasis.10.1.2024.35-44.

Downloads

Published

2025-02-13

How to Cite

El-Taj, H., Hamedah, D., & Saeed, R. (2025). Artificial Intelligence and Advanced Cybersecurity to Mitigate Credential-Stuffing Attacks in the Banking Industry. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.754

Issue

Section

Research Article