A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects

R Han, H Gong, S Ma, J Li, C Xu… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Authentication and cryptography are critical security functions and, thus, are very often
included as part of code. These functions require using credentials, such as passwords …

Traffic trajectory data analysis technology based on HMM model map matching algorithm

M Sun, X Li - Plos one, 2024 - journals.plos.org
The rapid growth of traffic trajectory data and the development of positioning technology
have driven the demand for its analysis. However, in the current application scenarios, there …

Dynamic markov model: Password guessing using probability adjustment method

X Guo, Y Liu, K Tan, W Mao, M Jin, H Lu - Applied Sciences, 2021 - mdpi.com
In password guessing, the Markov model is still widely used due to its simple structure and
fast inference speed. However, the Markov model based on random sampling to generate …