MQTTset, a new dataset for machine learning techniques on MQTT

I Vaccari, G Chiola, M Aiello, M Mongelli, E Cambiaso - Sensors, 2020 - mdpi.com
IoT networks are increasingly popular nowadays to monitor critical environments of different
nature, significantly increasing the amount of data exchanged. Due to the huge number of …

Balancing password security and user convenience: Exploring the potential of prompt models for password generation

AP Umejiaku, P Dhakal, VS Sheng - Electronics, 2023 - mdpi.com
With the increasing prevalence of cyber attacks and data breaches, the importance of strong
passwords cannot be overstated. Password generating software has been widely used to …

Design and development of a cloud-based ids using apache KAFKA and spark streaming

L Wirz, R Tanthanathewin, A Ketphet… - … Joint Conference on …, 2022 - ieeexplore.ieee.org
Owing to the efficient resource management, accessibility, and high service availability,
cloud computing has been leveraged by several intensive-data processing applications …

Salt Hash Password Using MD5 Combination for Dictionary Attack Protection

A Nugroho, T Mantoro - 2023 6th International Conference of …, 2023 - ieeexplore.ieee.org
Using MD5 hashing of passwords in web logins is highly vulnerable to dictionary attacks.
One online application for cracking hashed passwords using a dictionary attack that is free …

Cognitively reconfigurable mimic-based heterogeneous password recovery system

B Li, Q Zhou, Y Cao, X Si - Computers & Security, 2022 - Elsevier
The recovery of encrypted information systems based on password verification mechanisms
is an important task in electronic forensics, data restoration, illegal information filtering, and …

[PDF][PDF] Security auditing tools: a comparative study

S Islam - International Journal of Computing Sciences …, 2021 - pdfs.semanticscholar.org
Purpose–This paper concentrates on the comparison of security auditing tools specifying
password cracking tools based on different matrices. Passwords are the most popular and …

Cryptanalysis on the head and tail technique for hashing passwords

MAD Brogada, AM Sison… - 2019 IEEE 7th Conference …, 2019 - ieeexplore.ieee.org
Researchers and experts had developed numerous hash-based password authentication
schemes. Inappropriately, most of them are susceptible to different attacks. This study …

Detection And Prevention Of Cyber Attacks On Multi-purpose IoT Devices Using Honeypot

U Goyal, A Krishna, A Kumar… - Proceedings of the …, 2022 - papers.ssrn.com
Abstract The IoT (Internet of Things) mainly describes the physical things added with
sensors, their processing ability, software, and many other types of technologies that join …

Evaluation of the security of password-protected encrypted RAR3 and RAR5 archives

E Krupalija, S Mrdovic, E Cogo… - NCIT 2022; …, 2022 - ieeexplore.ieee.org
Roshal Archive (RAR) format is one of the most widely used data archive formats, enabling
users to reduce the size of data and protect it with the desired password before the data is …

[PDF][PDF] Implementing and comparing different password cracking tools

D Pahuja, P Sidana - … Journal of Engineering and Technology (IRJET …, 2021 - academia.edu
This article looks at the essence of the cracking of passwords and modern applications.
Several applications are being studied for various platforms. Various cracking methods …