Wiefling, Stephan; Dürmuth, Markus; Lo Iacono, Luigi (2021-01-26). "What's in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics" (PDF). Financial Cryptography and Data Security. FC '21. Vol. 12675. pp. 361–381. arXiv:2101.10681. doi:10.1007/978-3-662-64331-0_19. ISBN 978-3-662-64330-3. S2CID 231709486. 978-3-662-64330-3
US patent 9021555, Takaya Kato, "Risk-based authentication patent", issued March 29, 2006
https://worldwide.espacenet.com/textdoc?DB=EPODOC&IDX=US9021555
Wiefling, Stephan; Lo Iacono, Luigi; Dürmuth, Markus. "Information website on Risk-based Authentication". Risk-based Authentication. Retrieved 2019-04-29. https://riskbasedauthentication.org/
Wiefling, Stephan; Lo Iacono, Luigi; Dürmuth, Markus (2019). "Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild". In Dhillon, Gurpreet; Karlsson, Fredrik; Hedström, Karin; Zúquete, André (eds.). ICT Systems Security and Privacy Protection. IFIP Advances in Information and Communication Technology. Vol. 562. Springer International Publishing. pp. 134–148. arXiv:2003.07622. doi:10.1007/978-3-030-22312-0_10. ISBN 9783030223120. S2CID 189926752. 9783030223120
Williamson, G. (2006). "Enhanced Authentication In Online Banking" (PDF). Journal of Economic Crime Management. 4 (2): 18–19. http://utica.edu/academic/institutes/ecii/publications/articles/51D6D996-90F2-F468-AC09C4E8071575AE.pdf
US patent 9021555, Takaya Kato, "Risk-based authentication patent", issued March 29, 2006
https://worldwide.espacenet.com/textdoc?DB=EPODOC&IDX=US9021555
Wiefling, Stephan; Dürmuth, Markus; Lo Iacono, Luigi (2020-12-07). "More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication". Annual Computer Security Applications Conference. ACSAC '20. Austin, USA: Association for Computing Machinery. pp. 203–218. arXiv:2010.00339. doi:10.1145/3427228.3427243. ISBN 978-1-4503-8858-0. 978-1-4503-8858-0
Wiefling, Stephan; Lo Iacono, Luigi; Dürmuth, Markus. "Who uses RBA? We found evidence that Google, Facebook, LinkedIn, Amazon and GOG.com are using it". Risk-based Authentication. Retrieved 2019-04-29. https://riskbasedauthentication.org/
Borky, John M.; Bradley, Thomas H. (2019). "Protecting Information with Cybersecurity". In Borky, John M.; Bradley, Thomas H. (eds.). Effective Model-Based Systems Engineering. Cham: Springer International Publishing. pp. 345–404. doi:10.1007/978-3-319-95669-5_10. ISBN 978-3-319-95669-5. PMC 7122347. Retrieved 2023-08-28. 978-3-319-95669-5