Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues
H Aldawood, G Skinner - Future internet, 2019 - mdpi.com
The idea and perception of good cyber security protection remains at the forefront of many
organizations' information and communication technology strategy and investment …
organizations' information and communication technology strategy and investment …
Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …
Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …
protocols based on public-key techniques have attracted much attention, providing secure …
Passgan: A deep learning approach for password guessing
State-of-the-art password guessing tools, such as HashCat and John the Ripper, enable
users to check billions of passwords per second against password hashes. In addition to …
users to check billions of passwords per second against password hashes. In addition to …
Label-only model inversion attacks: Attack with the least information
In a model inversion attack, an adversary attempts to reconstruct the training data records of
a target model using only the model's output. In launching a contemporary model inversion …
a target model using only the model's output. In launching a contemporary model inversion …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Password guessing using random forest
Passwords are the most widely used authentication method, and guessing attacks are the
most effective method for password strength evaluation. However, existing password …
most effective method for password strength evaluation. However, existing password …
Chunk-level password guessing: Towards modeling refined password composition representations
Textual password security hinges on the guessing models adopted by attackers, in which a
suitable password composition representation is an influential factor. Unfortunately, the …
suitable password composition representation is an influential factor. Unfortunately, the …
How to attack and generate honeywords
Honeywords are decoy passwords associated with each user account to timely detect
password leakage. The key issue lies in how to generate honeywords that are hard to be …
password leakage. The key issue lies in how to generate honeywords that are hard to be …
No single silver bullet: Measuring the accuracy of password strength meters
To help users create stronger passwords, nearly every respectable web service adopts a
password strength meter (PSM) to provide real-time strength feedback upon user …
password strength meter (PSM) to provide real-time strength feedback upon user …