Advancements in Detection and Mitigation: Fortifying Against APTs-A Comprehensive Review

A Kumar, M Fahad, H Arif… - … Jurnal Multidisiplin Ilmu, 2024 - journal.mediapublikasi.id
Organizations' cyber security posture is severely challenged by Advanced Persistent Threats
(APTs), necessitating a multifaceted defense strategy. Traditional methods, machine …

HealthDep: An efficient and secure deduplication scheme for cloud-assisted eHealth systems

Y Zhang, C Xu, H Li, K Yang, J Zhou… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we analyze the inherent characteristic of electronic medical records (EMRs)
from actual electronic health (eHealth) systems, where we found that first, multiple patients …

Behavioral biometrics & continuous user authentication on mobile devices: A survey

I Stylios, S Kokolakis, O Thanou, S Chatzis - Information Fusion, 2021 - Elsevier
This paper offers an up-to-date, comprehensive, extensive and targeted survey on
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …

Honeywords: Making password-cracking detectable

A Juels, RL Rivest - Proceedings of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
We propose a simple method for improving the security of hashed passwords: the
maintenance of additional``honeywords''(false passwords) associated with each user's …

{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound

N Karapanos, C Marforio, C Soriente… - 24th USENIX security …, 2015 - usenix.org
Two-factor authentication protects online accounts even if passwords are leaked. Most
users, however, prefer password-only authentication. One reason why twofactor …

“It's not actually that horrible” Exploring Adoption of Two-Factor Authentication at a University

J Colnago, S Devlin, M Oates, C Swoopes… - Proceedings of the …, 2018 - dl.acm.org
Despite the additional protection it affords, two-factor authentication (2FA) adoption
reportedly remains low. To better understand 2FA adoption and its barriers, we observed the …

Code coverage and test suite effectiveness: Empirical study with real bugs in large systems

PS Kochhar, F Thung, D Lo - 2015 IEEE 22nd international …, 2015 - ieeexplore.ieee.org
During software maintenance, testing is a crucial activity to ensure the quality of program
code as it evolves over time. With the increasing size and complexity of software, adequate …

An intelligent classification model for phishing email detection

A Yasin, A Abuhasan - arXiv preprint arXiv:1608.02196, 2016 - arxiv.org
Phishing attacks are one of the trending cyber attacks that apply socially engineered
messages that are communicated to people from professional hackers aiming at fooling …

PPGPass: Nonintrusive and secure mobile two-factor authentication via wearables

Y Cao, Q Zhang, F Li, S Yang… - IEEE INFOCOM 2020 …, 2020 - ieeexplore.ieee.org
Mobile devices are promising to apply two-factor authentication in order to improve system
security and enhance user privacy-preserving. Existing solutions usually have certain limits …

Provable security analysis of FIDO2

M Barbosa, A Boldyreva, S Chen… - Advances in Cryptology …, 2021 - Springer
We carry out the first provable security analysis of the new FIDO2 protocols, the promising
FIDO Alliance's proposal for a standard for passwordless user authentication. Our analysis …