Security issues in text-based password authentication are rarely caused by technical issues, but rather by the limitations of human memory, and human perceptions together with their consequential responses. This study introduces a new user-friendly guideline approach to password creation, including persuasive messages that motivate and influence users to select more secure and memorable text passwords without overburdening their memory. From a broad understanding of human factors-caused security problems, we offer a reliable solution by encouraging users to create their own formula to compose passwords. A study has been conducted to evaluate the efficiency of the proposed password guidelines. Its results suggest that the password creation methods and persuasive message provided to users convinced them to create cryptographically strong and memorable passwords. Participants were divided into two groups in the study. The participants in the experimental group who were given several password creation methods along with a persuasive message created more secure and memorable passwords than the participants in the control group who were asked to comply with the usual strict password creation rules. The study also suggests that our password creation methods are much more efficient than strict password policy rules. The security and usability evaluation of the proposed password guideline showed that simple improvements such as adding persuasive text to the usual password guidelines consisting of several password restriction rules make significant changes to the strength and memorability of passwords. The proposed password guidelines are a low-cost solution to the problem of improving the security and usability of text-based passwords.
Abstract. Considering the popularity and wide deployment of text passwords, we predict that they will be used as a prevalent authentication mechanism for many years to come. Thus, we have carried out studies on mechanisms to enhance text passwords. These studies suggest that password space and memorability should be improved, with an additional mechanism based on images. The combination of text and images increases resistance to some password attacks, such as brute force and observing attacks. We propose a hybrid authentication scheme integrating text and recognition-based graphical passwords. This authentication scheme can reduce the phishing attacks because if users are deceived to share their key passwords, there is still a chance to save the complete password as attackers do not know the users' image preferences. In addition to the security aspect, the proposed authentication scheme increases memorability as it does not require users to remember long and complex passwords. Thus, with the proposed scheme users will be able to create strong passwords without sacrificing usability. The hybrid scheme also offers an enjoyable sign-in/log-in experience to users.
Due to its nature, cyber security is one of the fields that can benefit most from the techniques of artificial intelligence (AI). Under normal circumstances, it is difficult to write software to defend against cyber-attacks that are constantly developing and strengthening in network systems. By applying artificial intelligence techniques, software that can detect attacks and take precautions can be developed. In cases where traditional security systems are inadequate and slow, security applications developed with artificial intelligence techniques can provide better security against many complex cyber threats. Apart from being a good solution for cyber security problems, it also brings usage problems, legal risks, and concerns. This study focuses on how AI can help solve cyber security issues while discussing artificial intelligence threats and risks. This study also aims to present several AI-based techniques and to explain what these techniques can provide to solve problems in the field of cyber security.
Azides are significant compounds because of their biological effects on bacteria, viruses, fungi, and cancer. The antibacterial and anticancer properties of azide derivatives have been demonstrated in several microbial strains and cancer cell lines. The most significant microorganisms in command of hospital-acquired nosocomial infections include Acinetobacter baumannii (A. baumannii), Methicillin-resistant Staphylococcus aureus (MRSA), Candida albicans (C. albicans), and Candida dubliniensis (C. dubliniensis). These infections have become resistant to a variety of antibiotics. These resistant infections are frequently seen in cancer patients. Novel drug-active compounds are thus required that have both antibacterial and anticancer activity. This study examined previously synthesized 1-azido-5,6,7-trimethoxy-2,3-dihydro-1H-indene (4) for its antibacterial and anticancer activities. Antimicrobial activity was assessed using the disc diffusion technique, and minimum inhibitory concentration values were computed for zone formation in the examined pathogens. The study's findings indicate that while azide derivatives did not exhibit any effect against other pathogens, they suppressed bacterial growth with a zone diameter of 10 mm against A. baumannii. The MIC values of azide derivative against A. baumannii were 3.90 µg/ml. WST-8 analysis in Caco-2 cancer and healthy fibroblast cell line was used to determine the anticancer study. As a result of this analysis, the IC50 value was calculated to be 2.99 µM. There is little anticancer activity. A very low toxic effect of the azide compound on fibroblast cells was also observed. These findings suggest that this azide derivative may be tested as a potential antibacterial and anticancer agent.
Abstract-In this paper, we present an approach to estimate mobile sound source trajectory. An artificially created sound source signal is used in this work. The main aim of this paper is to estimate the mobile object trajectory via sound processing methods. The performance of generalized cross correlation techniques is compared with that of noise reduction filters for the success of trajectory estimation. The azimuth angle between the sound source and receiver is calculated during the whole movement. The parameter of Interaural Time Difference (ITD) is utilized for determining azimuth angle. The success of estimated delay is compared with different types of Generalized Cross Correlation (GCC) algorithms. In this study, an approach for sound localization and trajectory estimation on 2D space is proposed. Besides, different types of pre-filter method are tried for removing the noise and signal smoothing of recorded sound signals. Some basic parameters of sound localization process are also explained. Moreover, the calculation error of average azimuth angle is compared with different GCC and pre-filtered methods. To conclude, it is observed that estimation of location and trajectory information of a mobile object from a stereo sound recording is realized successfully.
This study presents to what extent Kyrgyz-Turkish Manas University students are knowledgeable about cybersecurity in the distance education process. The survey was conducted with a sample of 517 students from all faculties of the university at the undergraduate, graduate, and PhD levels. Our research study shows that although huge numbers of cyberattacks are occurring around the world, the students did not have any knowledge about cybersecurity and the effects of cyberattacks overall. An analysis of cybersecurity awareness was undertaken by asking questions focused on malicious software, password security, and social media security. Although we live in an age of technology where our entire lives are indexed to the internet through the distance education process, it has been determined that students have a weak cybersecurity awareness. It has been further concluded that cybersecurity education should be given to prevent the students from becoming a victim of cyberattacks, helping them to use the internet more effectively.
In this study, nicotinoyl thiourea synthesized by starting from nicotinic acid and 3,5-dimethoxy aniline according to the literature. The resulting product was reacted with Manganese (II) acetate tetrahydrate and nicotinoyl thiourea manganese complex was synthesized with a metal-ligand ratio of 1: 1. The chemical structure of newly synthesized metal complex was characterized by FTIR, HRMS, XRD, and elemental analysis. In the second part of the study, the antibacterial and antioxidant activities of the synthesized metal complex were investigated. According to the obtained results, metal complex did not show any antibacterial activity. However, metal complex exhibited strong or equipotent antioxidant properties compared to standard antioxidants in DPPH, ABTS, and Cuprac methods. For this reason, metal complex can be evaluated as an antioxidant agent in food protection and the treatment of many diseases related oxidative stress.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.