Machine learning and soft computing for ICT security: an overview of current trends

F Camastra, A Ciaramella, A Staiano - Journal of Ambient Intelligence and …, 2013 - Springer
In the last years, people have been seeing the pervasive use of computer, communication
technology and Internet, eg, e-mail, online shopping, banking, gaming, Internet telephony …

[PDF][PDF] Artificially intelligent cyberattacks

E Zouave, M Bruce, K Colde, M Jaitner, I Rodhe… - … FOI [Online] Available …, 2020 - uu.se
This report explores the possibilities and applications of artificial intelligence (AI) within the
various stages of a cyberattack. It is a literature review of the current state of the art in AI …

Big data analytics for classification of network enabled devices

D Arora, KF Li, A Loffler - 2016 30th International Conference …, 2016 - ieeexplore.ieee.org
As information technology (IT) and telecommunication systems continue to grow in size and
complexity, especially with Internet of Things (IoT) gaining popularity, maintaining a secure …

Password Strength Analysis and its Classification by Applying Machine Learning Based Techniques

S Sarkar, M Nandan - 2022 Second International Conference …, 2022 - ieeexplore.ieee.org
Passwords serve as a vital authentication mechanism for any system's protection. Although
numerous more secure methods of authentication exists such as biometrics and smart cards …

Efficiency Comparison of Dataset Generated by LLMs using Machine Learning Algorithms

P Pawade, M Kulkarni, S Naik, A Raut… - … on Emerging Smart …, 2024 - ieeexplore.ieee.org
The constantly expanding field of Large Language Models (LLMs) offers exciting
opportunities for various domains. These powerful models, such as GPT-3.5, Bard, and Bing …

[PDF][PDF] Proactive password strength analyzer using filters and machine learning techniques

G Suganya, S Karpgavalli, V Christina - International Journal of Computer …, 2010 - Citeseer
Passwords are ubiquitous authentication methods and they represent the identity of an
individual for a system. Users are consistently told that a strong password is essential these …

Robust password security: a genetic programming approach with imbalanced dataset handling

N Andelić, S Baressi S̆egota, Z Car - International Journal of Information …, 2024 - Springer
Developing a method for determining password strength using artificial intelligence (AI) is
crucial as it enhances cybersecurity by providing a more robust defense against …

Factors for measuring password-based authentication practices

HJ Mattord, Y Levy, S Furnell - Journal of Information Privacy and …, 2014 - Taylor & Francis
Organizations rely on password-based authentication methods to control access to their
Web-based systems. This research study developed a benchmarking instrument intended to …

A Comparative Work to Highlight the Superiority of Mouth Brooding Fish (MBF) over the Various ML Techniques in Password Security Classification.

Y Shi, Y Wang - … Journal of Advanced Computer Science & …, 2024 - search.ebscohost.com
Within the domain of password security classification, the pursuit of practical and
dependable methodologies has prompted the examination of both biological and …

Enhancing Password Security: Fuzzy AHP and TOPSIS-based Vulnerability Assessment

A Kumar, A Kodipall, T Rao, B Soma… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
In the digital age, passwords are key to securing access to personal, financial and corporate
assets. But the changing cyber threat landscape requires a stronger approach to password …