Nudging users towards better security decisions in password creation using whitebox-based multidimensional visualisations

K Hartwig, C Reuter - Behaviour & Information Technology, 2022 - Taylor & Francis
Nudging users to keep them secure online has become a growing research field in
cybersecurity. While existing approaches are mainly blackbox based, showing aggregated …

Enhanced evaluation model of security strength for passwords using integrated korean and english password dictionaries

KH Hong, UG Kang, BM Lee - Security and Communication …, 2021 - Wiley Online Library
In the field of information security, passwords are a means of authenticating users.
Passwords with weak security cannot perform the role of user authentication and personal …

A deep learning-based password security evaluation model

KH Hong, BM Lee - Applied Sciences, 2022 - mdpi.com
It is very important to consider whether a password has been leaked, because security can
no longer be guaranteed for passwords exposed to attackers. However, most existing …

Password Management: How Secure Is Your Login Process?

G Hatzivasilis - International workshop on model-driven simulation and …, 2020 - Springer
Pairs of usernames and passwords are widely used nowadays by mobile and web
applications to identify users. The exposure of this data harms both users and vendors. The …

PassViz: An Interactive Visualisation System for Analysing Leaked Passwords

S Parker, H Yuan, S Li - 2023 IEEE Symposium on Visualization …, 2023 - ieeexplore.ieee.org
Passwords remain the most widely used form of user authentication, despite advancements
in other methods. However, their limitations, such as susceptibility to attacks, especially …

Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization

X Yu, Q Liao - International Journal of Information Security, 2019 - Springer
While other authentication methods exist, passwords are still the dominant way for user
authentication and system security. Over the years, passwords have become long and …

[PDF][PDF] IMPROVING SECURITY IN INTELLIGENT SYSTEMS: HOW EFFECTIVE ARE MACHINE LEARNING MODELS WITH TF-IDF VECTORIZATION FOR …

B SHANNAQ - Journal of Theoretical and Applied Information …, 2024 - jatit.org
This research assesses the practicability of machine learning models in classifying
consumers according to their passwords with the help of TF-IDF, which depicts exclusive …

[PDF][PDF] Secure and Usable Bio-Passwords based on Confidence Interval.

A Kim, G Han, SH Seo - J. Internet Serv. Inf. Secur., 2017 - isyou.info
The most popular user-authentication method is the password. Many authentication systems
try to enhance their security by enforcing a strong password policy, and by using the …

Adopting password manager applications among smartphone users

NA Alkaldi - 2019 - theses.gla.ac.uk
People use weak passwords for a variety of reasons, the most prescient of these being
memory load and inconvenience. The motivation to choose weak passwords is even more …

[图书][B] Application Layer Authentication Using a Time-Based Password Effect upon the Smart Home Automation Controller

AS Bringardner - 2017 - search.proquest.com
The evolution and convergence of embedded information and communication systems (ICS)
technologies has contributed to an era of device-embedded smart objects whose continually …