Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

Improving text passwords through persuasion

A Forget, S Chiasson, PC Van Oorschot… - Proceedings of the 4th …, 2008 - dl.acm.org
Password restriction policies and advice on creating secure passwords have limited effects
on password strength. Influencing users to create more secure passwords remains an open …

Machine learning for detecting brute force attacks at the network level

MM Najafabadi, TM Khoshgoftaar… - 2014 IEEE …, 2014 - ieeexplore.ieee.org
The tremendous growth in computer network and Internet usage, combined with the growing
number of attacks makes network security a topic of serious concern. One of the most …

A novel Machine Learning-based approach for the detection of SSH botnet infection

JTM Garre, MG Pérez, A Ruiz-Martínez - Future Generation Computer …, 2021 - Elsevier
Botnets are causing severe damages to users, companies, and governments through
information theft, abuse of online services, DDoS attacks, etc. Although significant research …

A ZigBee honeypot to assess IoT cyberattack behaviour

S Dowling, M Schukat, H Melvin - 2017 28th Irish signals and …, 2017 - ieeexplore.ieee.org
Wireless Personal Area Networks (WPAN) allow for the implementation of applications such
as home automation, remote control services, near-field technologies and personal health …

Revisiting defenses against large-scale online password guessing attacks

M Alsaleh, M Mannan… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Brute force and dictionary attacks on password-only remote login services are now
widespread and ever increasing. Enabling convenient login for legitimate users while …

IoTCMal: Towards a hybrid IoT honeypot for capturing and analyzing malware

B Wang, Y Dou, Y Sang, Y Zhang… - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Nowadays, the emerging Internet-of-Things (IoT) emphasize the need for the security of
network-connected devices. Additionally, there are two types of services in IoT devices that …

Behind the scenes of online attacks: an analysis of exploitation behaviors on the web

D Canali, D Balzarotti - 20th Annual Network & Distributed System …, 2013 - hal.science
Web attacks are nowadays one of the major threats on the Internet, and several studies have
analyzed them, providing details on how they are performed and how they spread. However …

powerLang: a probabilistic attack simulation language for the power domain

S Hacks, S Katsikeas, E Ling, R Lagerström… - Energy …, 2020 - Springer
Cyber-attacks on power-related IT and OT infrastructures can have disastrous
consequences for individuals, regions, as well as whole nations. In order to respond to these …

Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot

D Fraunholz, D Krohmer, SD Anton… - … conference on cyber …, 2017 - ieeexplore.ieee.org
Recently, advances in cyber-physical systems and IoT led to an increase in devices
connected to the internet. This rise of functionality also comes with an increased attack …