A survey on systems security metrics
M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …
systematically explored based on the understanding of attack-defense interactions, which …
[HTML][HTML] A survey exploring open source Intelligence for smarter password cracking
From the end of the last century to date, consumers are increasingly living their lives online.
In today's world, the average person spends a significant proportion of their time connecting …
In today's world, the average person spends a significant proportion of their time connecting …
Targeted online password guessing: An underestimated threat
While trawling online/offline password guessing has been intensively studied, only a few
studies have examined targeted online guessing, where an attacker guesses a specific …
studies have examined targeted online guessing, where an attacker guesses a specific …
zxcvbn:{Low-Budget} Password Strength Estimation
DL Wheeler - 25th USENIX Security Symposium (USENIX Security …, 2016 - usenix.org
zxcvbn: Low-Budget Password Strength Estimation Page 1 This paper is included in the
Proceedings of the 25th USENIX Security Symposium August 10–12, 2016 • Austin, TX …
Proceedings of the 25th USENIX Security Symposium August 10–12, 2016 • Austin, TX …
Let's go in for a closer look: Observing passwords in their natural habitat
Text passwords---a frequent vector for account compromise, yet still ubiquitous---have been
studied for decades by researchers attempting to determine how to coerce users to create …
studied for decades by researchers attempting to determine how to coerce users to create …
Privacy in the internet of things for smart healthcare
With the rapid development of wearable biosensors and wireless communication
technologies, various smart healthcare systems are proposed to monitor the health of …
technologies, various smart healthcare systems are proposed to monitor the health of …
Enhancing security behaviour by supporting the user
Although the role of users in maintaining security is regularly emphasised, this is often not
matched by an accompanying level of support. Indeed, users are frequently given …
matched by an accompanying level of support. Indeed, users are frequently given …
Gamification techniques for raising cyber security awareness
S Scholefield, LA Shepherd - HCI for Cybersecurity, Privacy and Trust: First …, 2019 - Springer
Due to the prevalence of online services in modern society, such as internet banking and
social media, it is important for users to have an understanding of basic security measures in …
social media, it is important for users to have an understanding of basic security measures in …
Ethical guidelines for nudging in information security & privacy
K Renaud, V Zimmermann - International Journal of Human-Computer …, 2018 - Elsevier
There has recently been an upsurge of interest in the deployment of behavioural economics
techniques in the information security and privacy domain. In this paper, we consider the …
techniques in the information security and privacy domain. In this paper, we consider the …
Chunk-level password guessing: Towards modeling refined password composition representations
Textual password security hinges on the guessing models adopted by attackers, in which a
suitable password composition representation is an influential factor. Unfortunately, the …
suitable password composition representation is an influential factor. Unfortunately, the …