Abstract: With the increasing complexity of cyber threats, traditional single-factor authentication systems have become highly vulnerable to attacks such as phishing, brute force, and social ...