A systematic review of graphical password methods resistant to shoulder-surfing attacks
Graphical passwords have emerged as an alternative to traditional alphanumeric
passwords, offering potentially better memorability. However, they are often vulnerable to …
passwords, offering potentially better memorability. However, they are often vulnerable to …
A Systematic Deconstruction of Human-Centric Privacy & Security Threats on Mobile Phones
Mobile phones are most likely the subject of targeted attacks, such as software exploits. The
resources needed to carry out such attacks are becoming increasingly available and, hence …
resources needed to carry out such attacks are becoming increasingly available and, hence …
[PDF][PDF] Advancing user classification models: A comparative analysis of machine learning approaches to enhance faculty password policies at the University of Buraimi
B Shannaq, O Ali, SA Maqbali… - Journal of Infrastructure …, 2024 - researchgate.net
In this paper, we assess the results of experiment with different machine learning algorithms
for the data classification on the basis of accuracy, precision, recall and F1-Score metrics …
for the data classification on the basis of accuracy, precision, recall and F1-Score metrics …
[PDF][PDF] IMPROVING SECURITY IN INTELLIGENT SYSTEMS: HOW EFFECTIVE ARE MACHINE LEARNING MODELS WITH TF-IDF VECTORIZATION FOR …
B SHANNAQ - Journal of Theoretical and Applied Information …, 2024 - jatit.org
This research assesses the practicability of machine learning models in classifying
consumers according to their passwords with the help of TF-IDF, which depicts exclusive …
consumers according to their passwords with the help of TF-IDF, which depicts exclusive …
A Secure Authentication Indexed Choice-Based Graphical Password Scheme for Web Applications and ATMs.
Authentication is the most crucial aspect of security and a predominant measure employed
in cybersecurity. Cloud computing provides a shared electronic device resource for users via …
in cybersecurity. Cloud computing provides a shared electronic device resource for users via …
[PDF][PDF] Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems.
MA Almaiah, LM Saqr, LA Al-Rawwash… - … , Materials & Continua, 2024 - researchgate.net
Database systems have consistently been prime targets for cyber-attacks and threats due to
the critical nature of the data they store. Despite the increasing reliance on database …
the critical nature of the data they store. Despite the increasing reliance on database …
Authentication for Access Mechanisms for Cloud Services Based on Improved Elliptic Curve Cryptography
M Narender, S Thaiyalnayaki - 2024 15th International …, 2024 - ieeexplore.ieee.org
In an era where cloud computing has become ubiquitous, ensuring robust security
measures is imperative to safeguard sensitive data and maintain user trust. Traditional …
measures is imperative to safeguard sensitive data and maintain user trust. Traditional …
[PDF][PDF] An Embarrassingly Simple Method to Compromise Language Models
J Wang - 2024 - preprints.org
Language models like BERT dominate current NLP research due to their robust
performance, but they are vulnerable to backdoor attacks. Such attacks cause the model to …
performance, but they are vulnerable to backdoor attacks. Such attacks cause the model to …
Hybrid Graphical Password Authentication Technique Based On GLCM And Canny Edge Detection
The process of verifying the identity of someone requesting access to a computer system,
network, or piece of hardware is known as authentication. One of the most popular forms of …
network, or piece of hardware is known as authentication. One of the most popular forms of …
Pin-a-Boo: Leveraging Segmentation and Hand Skeleton Tracking Frameworks to Discern Smartphone Pin Entry from a Video Feed
P Weich, O Lobachev - Available at SSRN 4924116 - papers.ssrn.com
Given the prevalence of sensitive information stored on smartphones, it is crucial to improve
their security. We present an attack strategy that reveals PIN entries on smartphones using …
their security. We present an attack strategy that reveals PIN entries on smartphones using …