Abstract: With growing frequency and sophistication of cyber threats, there is an urgent need for more adaptive, secure multi-factor authentication systems. Traditional approaches often tend to make ...