[HTML][HTML] A survey exploring open source Intelligence for smarter password cracking

A Kanta, I Coisel, M Scanlon - Forensic Science International: Digital …, 2020 - Elsevier
From the end of the last century to date, consumers are increasingly living their lives online.
In today's world, the average person spends a significant proportion of their time connecting …

A survey on information visualization for network and service management

VT Guimaraes, CMDS Freitas, R Sadre… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …

" I Added'!'at the End to Make It Secure": Observing Password Creation in the Lab

B Ur, F Noma, J Bees, SM Segreti, R Shay… - Eleventh symposium on …, 2015 - usenix.org
Users often make passwords that are easy for attackers to guess. Prior studies have
documented features that lead to easily guessed passwords, but have not probed why users …

Do users' perceptions of password security match reality?

B Ur, J Bees, SM Segreti, L Bauer, N Christin… - Proceedings of the …, 2016 - dl.acm.org
Although many users create predictable passwords, the extent to which users realize these
passwords are predictable is not well understood. We investigate the relationship between …

Measuring password guessability for an entire university

ML Mazurek, S Komanduri, T Vidas, L Bauer… - Proceedings of the …, 2013 - dl.acm.org
Despite considerable research on passwords, empirical studies of password strength have
been limited by lack of access to plaintext passwords, small data sets, and password sets …

Design and evaluation of a data-driven password meter

B Ur, F Alfieri, M Aung, L Bauer, N Christin… - Proceedings of the …, 2017 - dl.acm.org
Despite their ubiquity, many password meters provide inaccurate strength estimates.
Furthermore, they do not explain to users what is wrong with their password or how to …

Birthday, name and bifacial-security: understanding passwords of Chinese web users

D Wang, P Wang, D He, Y Tian - 28th USENIX security symposium …, 2019 - usenix.org
Much attention has been paid to passwords chosen by English speaking users, yet only a
few studies have examined how non-English speaking users select passwords. In this …

Designing password policies for strength and usability

R Shay, S Komanduri, AL Durity, P Huh… - ACM Transactions on …, 2016 - dl.acm.org
Password-composition policies are the result of service providers becoming increasingly
concerned about the security of online accounts. These policies restrict the space of user …

Priming through persuasion: Towards secure password behavior

R Paudel, MN Al-Ameen - Proceedings of the ACM on Human-Computer …, 2024 - dl.acm.org
Users tend to create weak passwords even for the important accounts. The prior research
shed light on user's insecure password behavior, and why the interventions, including …

Code coverage and test suite effectiveness: Empirical study with real bugs in large systems

PS Kochhar, F Thung, D Lo - 2015 IEEE 22nd international …, 2015 - ieeexplore.ieee.org
During software maintenance, testing is a crucial activity to ensure the quality of program
code as it evolves over time. With the increasing size and complexity of software, adequate …