[HTML][HTML] A survey exploring open source Intelligence for smarter password cracking

A Kanta, I Coisel, M Scanlon - Forensic Science International: Digital …, 2020 - Elsevier
From the end of the last century to date, consumers are increasingly living their lives online.
In today's world, the average person spends a significant proportion of their time connecting …

Birthday, name and bifacial-security: understanding passwords of Chinese web users

D Wang, P Wang, D He, Y Tian - 28th USENIX security symposium …, 2019 - usenix.org
Much attention has been paid to passwords chosen by English speaking users, yet only a
few studies have examined how non-English speaking users select passwords. In this …

A novel dictionary generation methodology for contextual-based password cracking

A Kanta, I Coisel, M Scanlon - IEEE Access, 2022 - ieeexplore.ieee.org
It has been more than 50 years since the concept of passwords was introduced and adopted
in our society as a digital authentication method. Despite alternative authentication methods …

[HTML][HTML] How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts

A Kanta, S Coray, I Coisel, M Scanlon - Forensic Science International …, 2021 - Elsevier
Passwords have been and still remain the most common method of authentication in
computer systems. These systems are therefore privileged targets of attackers, and the …

[HTML][HTML] Password-based authentication and the experiences of end users

A Ezugwu, E Ukwandu, C Ugwu, M Ezema, C Olebara… - Scientific African, 2023 - Elsevier
Passwords are used majorly for end-user authentication in information and communication
technology (ICT) systems due to its perceived ease of use. The use for end-user …

A taxonomy of SETA methods and linkage to delivery preferences

J Kävrestad, M Nohlberg, S Furnell - ACM SIGMIS Database: the …, 2023 - dl.acm.org
Cybersecurity threats targeting users are common in today's information systems. Threat
actors exploit human behavior to gain unauthorized access to systems and data. The …

Comparative analysis of three language spheres: Are linguistic and cultural differences reflected in password selection habits?

K Mori, T Watanabe, Y Zhou… - … on Information and …, 2020 - search.ieice.org
This work aims to determine the propensity of password creation through the lens of
language spheres. To this end, we consider four different countries, each with a different …

Decoding developer password patterns: A comparative analysis of password extraction and selection practices

N Lykousas, C Patsakis - Computers & Security, 2024 - Elsevier
Passwords play a crucial role in authentication, ensuring that only authorised entities can
access sensitive information. However, user password choices are often weak and …

Context-Based Micro-Training: Enhancing cybersecurity training for end-users

J Kävrestad - 2022 - diva-portal.org
This research addresses the human aspect of cybersecurity by developing a method for
cybersecurity training of end-users. The reason for addressing that area is that human …

A large-scale analysis of Wi-Fi passwords

E Veroni, C Ntantogian, C Xenakis - Journal of Information Security and …, 2022 - Elsevier
Passwords remain the most common method of authentication in computers and networks.
Thus, passwords have been the prime targets of attackers, and the number of data breaches …