Survey of security and privacy issues of internet of things

T Borgohain, U Kumar, S Sanyal - arXiv preprint arXiv:1501.02211, 2015 - arxiv.org
This paper is a general survey of all the security issues existing in the Internet of Things (IoT)
along with an analysis of the privacy issues that an end-user may face as a consequence of …

Survey on security issues in cloud computing and associated mitigation techniques

R Bhadauria, S Sanyal - arXiv preprint arXiv:1204.0764, 2012 - arxiv.org
Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost
computing infrastructure for IT-based solutions and services that the industry uses. It …

Cracking more password hashes with patterns

EI Tatlı - IEEE Transactions on Information Forensics and …, 2015 - ieeexplore.ieee.org
It is a common mistake of application developers to store user passwords within databases
as plaintext or only as their unsalted hash values. Many real-life successful hacking attempts …

A game theoretic approach to model cyber attack and defense strategies

A Attiah, M Chatterjee, CC Zou - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Most of the cybersecurity research focus on either presenting a specific vulnerability% or
hacking technique, or proposing a specific defense algorithm to defend against a well …

[PDF][PDF] User security issues in summative e-assessment security

KM Apampa, G Wills, D Argles - International Journal of …, 2010 - infonomics-society.org
Summative electronic assessments embodies enormous advantages such as automated
marking, immediate feedback and on-demand tests. User security plays a vital role in …

VAP code: A secure graphical password for smart devices

S Azad, M Rahman, MSAN Ranak, BMFK Ruhee… - Computers & Electrical …, 2017 - Elsevier
In parallel to the increasing purchase rate of the smart devices, attacks on these devices are
also increasing in an alarming rate. To prevent these attacks, many password-based …

Fugeids: Fuzzy genetic paradigms in intrusion detection systems

R Borgohain - arXiv preprint arXiv:1204.6416, 2012 - arxiv.org
With the increase in the number of security threats, Intrusion Detection Systems have
evolved as a significant countermeasure against these threats. And as such, the topic of …

A comparative analysis on remote user authentication schemes in telemedical healthcare systems

C Dewan, TG Kumar, S Gupta - International Journal of …, 2022 - inderscienceonline.com
In today's era, the e-healthcare sector is emerging and in high demand that provides mobility
to the users. It is a system where we put the information at a remote server for access to …

A new protocol to counter online dictionary attacks

V Goyal, V Kumar, M Singh, A Abraham, S Sanyal - computers & security, 2006 - Elsevier
The most popular method of authenticating users is through passwords. Though passwords
are the most convenient means of authentication, they bring along themselves the threat of …

Dynamic markov model: Password guessing using probability adjustment method

X Guo, Y Liu, K Tan, W Mao, M Jin, H Lu - Applied Sciences, 2021 - mdpi.com
In password guessing, the Markov model is still widely used due to its simple structure and
fast inference speed. However, the Markov model based on random sampling to generate …