On designing a modified-UI based honeyword generation approach for overcoming the existing limitations N Chakraborty, S Mondal Computers & Security 66, 155-168, 2017 | 43* | 2017 |
A hybrid machine learning approach for hypertension risk prediction M Fang, Y Chen, R Xue, H Wang, N Chakraborty, T Su, Y Dai Neural Computing and Applications 35 (20), 14487-14497, 2023 | 41 | 2023 |
Color Pass: An intelligent user interface to resist shoulder surfing attack N Chakraborty, S Mondal Proceedings of the 2014 IEEE Students' Technology Symposium, 13-18, 2014 | 28 | 2014 |
MobSecure: A shoulder surfing safe login approach implemented on mobile device N Chakraborty, GS Randhawa, K Das, S Mondal Procedia Computer Science 93, 854-861, 2016 | 21 | 2016 |
Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services N Chakraborty, VS Anand, S Mondal Computers & Security 84, 193-205, 2019 | 16 | 2019 |
On designing a questionnaire based honeyword generation approach for achieving flatness N Chakraborty, S Singh, S Mondal 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 16* | 2018 |
Few notes towards making honeyword system more secure and usable N Chakraborty, S Mondal Proceedings of the 8th International Conference on Security of Information …, 2015 | 15 | 2015 |
Towards improving storage cost and security features of honeyword based approaches N Chakraborty, S Mondal Procedia Computer Science 93, 799-807, 2016 | 14 | 2016 |
Tag digit based honeypot to detect shoulder surfing attack N Chakraborty, S Mondal Security in Computing and Communications: Second International Symposium …, 2014 | 12 | 2014 |
On designing a lesser obtrusive authentication protocol to prevent machine-learning-based threats in internet of things N Chakraborty, JQ Li, S Mondal, C Luo, H Wang, M Alazab, F Chen, ... IEEE Internet of Things Journal 8 (5), 3255-3267, 2020 | 10 | 2020 |
RTT-based rogue UAV detection in Iov Networks N Chakraborty, Y Chao, J Li, S Mishra, C Luo, Y He, J Chen, Y Pan IEEE Internet of Things Journal 9 (8), 5909-5919, 2021 | 9 | 2021 |
On overcoming the Identified limitations of a usable pin entry method N Chakraborty, J Li, S Mondal, F Chen, Y Pan IEEE Access 7, 124366-124378, 2019 | 9 | 2019 |
An improved methodology towards providing immunity against weak shoulder surfing attack N Chakraborty, S Mondal Information Systems Security: 10th International Conference, ICISS 2014 …, 2014 | 9 | 2014 |
SLASS: Secure login against shoulder surfing N Chakraborty, S Mondal Recent Trends in Computer Networks and Distributed Systems Security: Second …, 2014 | 7 | 2014 |
On designing leakage-resilient vibration based authentication techniques N Chakraborty, SV Anand, GS Randhawa, S Mondal 2016 IEEE Trustcom/BigDataSE/ISPA, 1875-1881, 2016 | 6 | 2016 |
Cryptanalysis of a honeyword system in the IoT platform N Chakraborty, M Mukherjee, J Li, M Shojafar, Y Pan IEEE internet of things journal 9 (4), 2614-2626, 2021 | 5 | 2021 |
The tables have turned: GPT-3 distinguishing passwords from honeywords N Chakraborty, Y Yamout, M Zulkernine 2023 IEEE Conference on Communications and Network Security (CNS), 1-5, 2023 | 4 | 2023 |
Honeyword-based authentication techniques for protecting passwords: A survey N Chakraborty, J Li, VCM Leung, S Mondal, Y Pan, C Luo, M Mukherjee ACM Computing Surveys 55 (8), 1-37, 2022 | 4 | 2022 |
On understanding the impact of RTT in the mobile network for detecting the rogue UAVs N Chakraborty, Y Chao, C Luo, J Li, P Ziying, J Chen, Y Pan IEEE Transactions on Cognitive Communications and Networking 6 (4), 1218-1229, 2020 | 4 | 2020 |
On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries N Chakraborty, S Mondal Frontiers of Computer Science 15, 1-19, 2021 | 2 | 2021 |