A systematic review of graphical password methods resistant to shoulder-surfing attacks

F Binbeshr, KC Siong, L Yee, M Imam… - International Journal of …, 2025 - Springer
Graphical passwords have emerged as an alternative to traditional alphanumeric
passwords, offering potentially better memorability. However, they are often vulnerable to …

A Systematic Deconstruction of Human-Centric Privacy & Security Threats on Mobile Phones

H Farzand, M Abraham, S Brewster… - … Journal of Human …, 2024 - Taylor & Francis
Mobile phones are most likely the subject of targeted attacks, such as software exploits. The
resources needed to carry out such attacks are becoming increasingly available and, hence …

[PDF][PDF] Advancing user classification models: A comparative analysis of machine learning approaches to enhance faculty password policies at the University of Buraimi

B Shannaq, O Ali, SA Maqbali… - Journal of Infrastructure …, 2024 - researchgate.net
In this paper, we assess the results of experiment with different machine learning algorithms
for the data classification on the basis of accuracy, precision, recall and F1-Score metrics …

[PDF][PDF] IMPROVING SECURITY IN INTELLIGENT SYSTEMS: HOW EFFECTIVE ARE MACHINE LEARNING MODELS WITH TF-IDF VECTORIZATION FOR …

B SHANNAQ - Journal of Theoretical and Applied Information …, 2024 - jatit.org
This research assesses the practicability of machine learning models in classifying
consumers according to their passwords with the help of TF-IDF, which depicts exclusive …

A Secure Authentication Indexed Choice-Based Graphical Password Scheme for Web Applications and ATMs.

S Zarif, H Moawad, K Amin, A Alharbi… - … Systems Science & …, 2025 - search.ebscohost.com
Authentication is the most crucial aspect of security and a predominant measure employed
in cybersecurity. Cloud computing provides a shared electronic device resource for users via …

[PDF][PDF] Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems.

MA Almaiah, LM Saqr, LA Al-Rawwash… - … , Materials & Continua, 2024 - researchgate.net
Database systems have consistently been prime targets for cyber-attacks and threats due to
the critical nature of the data they store. Despite the increasing reliance on database …

Authentication for Access Mechanisms for Cloud Services Based on Improved Elliptic Curve Cryptography

M Narender, S Thaiyalnayaki - 2024 15th International …, 2024 - ieeexplore.ieee.org
In an era where cloud computing has become ubiquitous, ensuring robust security
measures is imperative to safeguard sensitive data and maintain user trust. Traditional …

[PDF][PDF] An Embarrassingly Simple Method to Compromise Language Models

J Wang - 2024 - preprints.org
Language models like BERT dominate current NLP research due to their robust
performance, but they are vulnerable to backdoor attacks. Such attacks cause the model to …

Hybrid Graphical Password Authentication Technique Based On GLCM And Canny Edge Detection

SF Abbas, LM Jawad - … for Dependable Internet of Things (ICETI …, 2024 - ieeexplore.ieee.org
The process of verifying the identity of someone requesting access to a computer system,
network, or piece of hardware is known as authentication. One of the most popular forms of …

Pin-a-Boo: Leveraging Segmentation and Hand Skeleton Tracking Frameworks to Discern Smartphone Pin Entry from a Video Feed

P Weich, O Lobachev - Available at SSRN 4924116 - papers.ssrn.com
Given the prevalence of sensitive information stored on smartphones, it is crucial to improve
their security. We present an attack strategy that reveals PIN entries on smartphones using …