A survey on systems security metrics

M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …

[HTML][HTML] A survey exploring open source Intelligence for smarter password cracking

A Kanta, I Coisel, M Scanlon - Forensic Science International: Digital …, 2020 - Elsevier
From the end of the last century to date, consumers are increasingly living their lives online.
In today's world, the average person spends a significant proportion of their time connecting …

Targeted online password guessing: An underestimated threat

D Wang, Z Zhang, P Wang, J Yan… - Proceedings of the 2016 …, 2016 - dl.acm.org
While trawling online/offline password guessing has been intensively studied, only a few
studies have examined targeted online guessing, where an attacker guesses a specific …

zxcvbn:{Low-Budget} Password Strength Estimation

DL Wheeler - 25th USENIX Security Symposium (USENIX Security …, 2016 - usenix.org
zxcvbn: Low-Budget Password Strength Estimation Page 1 This paper is included in the
Proceedings of the 25th USENIX Security Symposium August 10–12, 2016 • Austin, TX …

Let's go in for a closer look: Observing passwords in their natural habitat

S Pearman, J Thomas, PE Naeini, H Habib… - Proceedings of the …, 2017 - dl.acm.org
Text passwords---a frequent vector for account compromise, yet still ubiquitous---have been
studied for decades by researchers attempting to determine how to coerce users to create …

Privacy in the internet of things for smart healthcare

D He, R Ye, S Chan, M Guizani… - IEEE Communications …, 2018 - ieeexplore.ieee.org
With the rapid development of wearable biosensors and wireless communication
technologies, various smart healthcare systems are proposed to monitor the health of …

Enhancing security behaviour by supporting the user

S Furnell, R Esmael, W Yang, N Li - Computers & Security, 2018 - Elsevier
Although the role of users in maintaining security is regularly emphasised, this is often not
matched by an accompanying level of support. Indeed, users are frequently given …

Gamification techniques for raising cyber security awareness

S Scholefield, LA Shepherd - HCI for Cybersecurity, Privacy and Trust: First …, 2019 - Springer
Due to the prevalence of online services in modern society, such as internet banking and
social media, it is important for users to have an understanding of basic security measures in …

Ethical guidelines for nudging in information security & privacy

K Renaud, V Zimmermann - International Journal of Human-Computer …, 2018 - Elsevier
There has recently been an upsurge of interest in the deployment of behavioural economics
techniques in the information security and privacy domain. In this paper, we consider the …

Chunk-level password guessing: Towards modeling refined password composition representations

M Xu, C Wang, J Yu, J Zhang, K Zhang… - Proceedings of the 2021 …, 2021 - dl.acm.org
Textual password security hinges on the guessing models adopted by attackers, in which a
suitable password composition representation is an influential factor. Unfortunately, the …