[PDF][PDF] Dark web illegal activities crawling and classifying using data mining techniques
Dark web is a canopy concept that denotes any kind of illicit activities carried out by
anonymous persons or organizations, thereby making it difficult to trace. The illicit content on …
anonymous persons or organizations, thereby making it difficult to trace. The illicit content on …
Ready-to-(ab) use: From fake account trafficking to coordinated inauthentic behavior on Twitter
Fake accounts are the primary means for misuse and abuse of social media platforms,
giving rise to coordinated inauthentic behaviors. Despite ongoing efforts to limit their …
giving rise to coordinated inauthentic behaviors. Despite ongoing efforts to limit their …
RALF: an adaptive reinforcement learning framework for teaching dyslexic students
Dyslexia is a learning disorder in which individuals have significant reading difficulties.
Previous studies found that using machine learning techniques in content supplements is …
Previous studies found that using machine learning techniques in content supplements is …
[PDF][PDF] “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication
Password-based authentication is the status quo on the web and beyond [6, 13, 14]—
despite its many known problems. This includes challenges around memorizing passwords …
despite its many known problems. This includes challenges around memorizing passwords …
[PDF][PDF] Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions
N Kheshaifaty, A Gutub - Int. J. Comput. Sci. Netw. Secur.(IJCSNS), 2020 - researchgate.net
Authentication is the process of verifying the identity of online computer users. It can be
confirmed using various methods such as captchas or encrypted hashed passwords to …
confirmed using various methods such as captchas or encrypted hashed passwords to …
Challenges and opportunities for Arabic CAPTCHAs
Abstract Arabic Completely Automated Public Turing test to tell Computers and Humans
Apart (CAPTCHA) has only recently gained attention, with a few studies on handwritten text …
Apart (CAPTCHA) has only recently gained attention, with a few studies on handwritten text …
[PDF][PDF] Research trends on CAPTCHA: A systematic literature
The advent of technology has crept into virtually all sectors and this has culminated in
automated processes making use of the Internet in executing various tasks and actions. Web …
automated processes making use of the Internet in executing various tasks and actions. Web …
CAPTCHA Types and Breaking Techniques: Design Issues, Challenges, and Future Research Directions
The proliferation of the Internet and mobile devices has resulted in malicious bots access to
genuine resources and data. Bots may instigate phishing, unauthorized access, denial-of …
genuine resources and data. Bots may instigate phishing, unauthorized access, denial-of …
A low-cost approach to crack python CAPTCHAs using AI-based chosen-plaintext attack
N Yu, K Darling - Applied sciences, 2019 - mdpi.com
CAPTCHA authentication has been challenged by recent technology advances in AI.
However, many of the AI advances challenging CAPTCHA are either restricted by a limited …
However, many of the AI advances challenging CAPTCHA are either restricted by a limited …
Do human cognitive differences in information processing affect preference and performance of CAPTCHA?
Abstract A Completely Automated Public Turing test to tell Computers and Humans Apart
(CAPTCHA) is a widely used security defense mechanism that is utilized by service …
(CAPTCHA) is a widely used security defense mechanism that is utilized by service …