Machine learning–based cyber attacks targeting on controlled information: A survey

Y Miao, C Chen, L Pan, QL Han, J Zhang… - ACM Computing Surveys …, 2021 - dl.acm.org
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …

[HTML][HTML] Research communities in cyber security vulnerability assessments: A comprehensive literature review

F Heiding, S Katsikeas, R Lagerström - Computer Science Review, 2023 - Elsevier
Ethical hacking and vulnerability assessments are gaining rapid momentum as academic
fields of study. Still, it is sometimes unclear what research areas are included in the …

An unexpectedly large count of trees in the West African Sahara and Sahel

M Brandt, CJ Tucker, A Kariryaa, K Rasmussen, C Abel… - Nature, 2020 - nature.com
A large proportion of dryland trees and shrubs (hereafter referred to collectively as trees)
grow in isolation, without canopy closure. These non-forest trees have a crucial role in …

Targeted online password guessing: An underestimated threat

D Wang, Z Zhang, P Wang, J Yan… - Proceedings of the 2016 …, 2016 - dl.acm.org
While trawling online/offline password guessing has been intensively studied, only a few
studies have examined targeted online guessing, where an attacker guesses a specific …

Privacy in the internet of things for smart healthcare

D He, R Ye, S Chan, M Guizani… - IEEE Communications …, 2018 - ieeexplore.ieee.org
With the rapid development of wearable biosensors and wireless communication
technologies, various smart healthcare systems are proposed to monitor the health of …

Protocols for checking compromised credentials

L Li, B Pal, J Ali, N Sullivan, R Chatterjee… - Proceedings of the …, 2019 - dl.acm.org
To prevent credential stuffing attacks, industry best practice now proactively checks if user
credentials are present in known data breaches. Recently, some web services, such as …

Improving real-world password guessing attacks via bi-directional transformers

M Xu, J Yu, X Zhang, C Wang, S Zhang, H Wu… - 32nd USENIX Security …, 2023 - usenix.org
Password guessing attacks, prevalent issues in the real world, can be conceptualized as
efforts to approximate the probability distribution of text tokens. Techniques in the natural …

Password guessing using random forest

D Wang, Y Zou, Z Zhang, K **u - 32nd USENIX Security Symposium …, 2023 - usenix.org
Passwords are the most widely used authentication method, and guessing attacks are the
most effective method for password strength evaluation. However, existing password …

Chunk-level password guessing: Towards modeling refined password composition representations

M Xu, C Wang, J Yu, J Zhang, K Zhang… - Proceedings of the 2021 …, 2021 - dl.acm.org
Textual password security hinges on the guessing models adopted by attackers, in which a
suitable password composition representation is an influential factor. Unfortunately, the …

The next domino to fall: Empirical analysis of user passwords across online services

C Wang, STK Jan, H Hu, D Bossart… - Proceedings of the Eighth …, 2018 - dl.acm.org
Leaked passwords from data breaches can pose a serious threat if users reuse or slightly
modify the passwords for other services. With more services getting breached today, there is …