Gotta CAPTCHA'Em all: a survey of 20 Years of the human-or-computer Dilemma

M Guerar, L Verderame, M Migliardi… - ACM Computing …, 2021 - dl.acm.org
A recent study has found that malicious bots generated nearly a quarter of overall website
traffic in 2019 [102]. These malicious bots perform activities such as price and content …

Recent advances of Captcha security analysis: a short literature review

NT Dinh, VT Hoang - Procedia Computer Science, 2023 - Elsevier
CAPTCHA has long been used to keep bots from misusing web services. Various CAPTCHA
schemes have been proposed over the years, principally to increase usability and security …

New cognitive deep-learning CAPTCHA

ND Trong, TH Huong, VT Hoang - Sensors, 2023 - mdpi.com
CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart),
or HIP (Human Interactive Proof), has long been utilized to avoid bots manipulating web …

CirclePIN: A novel authentication mechanism for smartwatches to prevent unauthorized access to IoT devices

M Guerar, L Verderame, A Merlo, F Palmieri… - ACM Transactions on …, 2020 - dl.acm.org
In the last months, the market for personal wearable devices has been booming significantly,
and, in particular, smartwatches are starting to assume a fundamental role in the Bring Your …

Human-artificial intelligence approaches for secure analysis in CAPTCHA codes

N Dinh, L Ogiela - EURASIP Journal on Information Security, 2022 - Springer
Abstract CAPTCHA (Completely Automated Public Turing test to tell Computers and
Humans Apart) has long been used to keep automated bots from misusing web services by …

Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT

M Guerar, A Merlo, M Migliardi, F Palmieri - computers & security, 2018 - Elsevier
Smartphone devices are often assuming the role of edge systems in mobile IoT scenarios
and the access to cloud-based services through smartphones, for transmitting multiple …

Securing PIN‐based authentication in smartwatches with just two gestures

M Guerar, M Migliardi, F Palmieri… - Concurrency and …, 2020 - Wiley Online Library
Smartwatches are becoming increasingly ubiquitous as they offer new capabilities to
develop sophisticated applications that make daily life easier and more convenient for …

Using screen brightness to improve security in mobile social network access

M Guerar, M Migliardi, A Merlo… - … on Dependable and …, 2016 - ieeexplore.ieee.org
In the today's mobile communications scenario, smartphones offer new capabilities to
develop sophisticated applications that seem to make daily life easier and more convenient …

Dynamic array PIN: A novel approach to secure NFC electronic payment between ATM and smartphone

S Chabbi, R Boudour, F Semchedine… - … Security Journal: A …, 2020 - Taylor & Francis
ABSTRACT Near Field Communication (NFC) technology has been used recently for
electronic payment between an Automated Teller Machine (ATM) and a Smartphone. It is …

Towards a Working Conceptual Framework: Cyber Law for Data Privacy and Information Security Management for the Industrial Internet of Things Application Domain

L Golightly, K Wnuk, N Shanmugan… - … on Industrial IoT, Big …, 2022 - ieeexplore.ieee.org
For Industrial Internet of Things (IIoT) and Big Data-Data Privacy presents significant
challenges in Cyber Security-specifically in the technological and legal environment. The …