[1]
E. Davis, “Beyond Phishing: Detecting MFA Fatigue and Adversary-in-the-Middle at Scale A Practical Playbook for Blue Teams in Resource-Constrained Environments”, ICMR, vol. 3, no. 1, Jan. 2026.