Machine learning–based cyber attacks targeting on controlled information: A survey
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …
information leakage incidents, has become an emerging cyber security threat in recent …
Machine learning enabled industrial iot security: Challenges, trends and solutions
C Ni, SC Li - Journal of Industrial Information Integration, 2024 - Elsevier
Abstract Introduction: The increasingly integrated Industrial IoT (IIoT) with industrial systems
brings benefits such as intelligent analytics, predictive maintenance, and remote monitoring …
brings benefits such as intelligent analytics, predictive maintenance, and remote monitoring …
Two birds with one stone: Two-factor authentication with security beyond conventional bound
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …
authentication has been a subject of intensive research in the past two decades, and …
Passgan: A deep learning approach for password guessing
State-of-the-art password guessing tools, such as HashCat and John the Ripper, enable
users to check billions of passwords per second against password hashes. In addition to …
users to check billions of passwords per second against password hashes. In addition to …
Zipf's law in passwords
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …
is the underlying distribution of user-generated passwords. In this paper, we make a …
Fast, lean, and accurate: Modeling password guessability using neural networks
Human-chosen text passwords, today's dominant form of authentication, are vulnerable to
guessing attacks. Unfortunately, existing approaches for evaluating password strength by …
guessing attacks. Unfortunately, existing approaches for evaluating password strength by …
zxcvbn:{Low-Budget} Password Strength Estimation
DL Wheeler - 25th USENIX Security Symposium (USENIX Security …, 2016 - usenix.org
zxcvbn: Low-Budget Password Strength Estimation Page 1 This paper is included in the
Proceedings of the 25th USENIX Security Symposium August 10–12, 2016 • Austin, TX …
Proceedings of the 25th USENIX Security Symposium August 10–12, 2016 • Austin, TX …
The impact of information security threat awareness on privacy-protective behaviors
In this study, we examine how to motivate computer users to protect themselves from
potential security and privacy threats. We draw on the Information Processing framework …
potential security and privacy threats. We draw on the Information Processing framework …
Do users' perceptions of password security match reality?
Although many users create predictable passwords, the extent to which users realize these
passwords are predictable is not well understood. We investigate the relationship between …
passwords are predictable is not well understood. We investigate the relationship between …
Measuring {Real-World} Accuracies and Biases in Modeling Password Guessability
Parameterized password guessability—how many guesses a particular cracking algorithm
with particular training data would take to guess a password—has become a common metric …
with particular training data would take to guess a password—has become a common metric …