2020
DOI: 10.1016/j.fsidi.2020.301075
|View full text |Cite
|
Sign up to set email alerts
|

A survey exploring open source Intelligence for smarter password cracking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 44 publications
0
6
0
1
Order By: Relevance
“…Furthermore, it facilitates the identification of potential security vulnerabilities and enables timely interventions to mitigate such risks. Moreover, the use of honeywords leads to the prompt suspension of the relevant user account, while the incorporation of system segmentation offers an extra advantage [11]. The honeychecker functions independently of the central system and is responsible for the generation of honeywords.…”
Section: Honeywordsmentioning
confidence: 99%
“…Furthermore, it facilitates the identification of potential security vulnerabilities and enables timely interventions to mitigate such risks. Moreover, the use of honeywords leads to the prompt suspension of the relevant user account, while the incorporation of system segmentation offers an extra advantage [11]. The honeychecker functions independently of the central system and is responsible for the generation of honeywords.…”
Section: Honeywordsmentioning
confidence: 99%
“…ey include all source data that indicate the accuracy of data to give credibility to the data for the argument and evidence. As a result, much of the general data is processed into data that meets the criteria set by the investigator, resulting in meaningful data [2,8,9].…”
Section: Definition Andmentioning
confidence: 99%
“…During the SLR presented here, the search strings returned seven surveys [Ahmad et al 2022;Al-Dhaqm et al 2020b;Kanta et al 2020;Liu et al 2022;Mahapatra and Khan 2012;Prajapati and Shah 2020;Sikos 2020]. However, their main focus is different, as they address: cyber security in IoT-based cloud computing [Ahmad et al 2022], database forensic investigation process models [Al-Dhaqm et al 2020b], open source intelligence for smarter password cracking [Kanta et al 2020], intrusion detection systems in the cloud computing [Liu et al 2022], existing techniques against SQL injection attacks • Seufitelli, Brandão and Moro [Mahapatra and Khan 2012], secure data deduplication [Prajapati and Shah 2020], and packet for network forensics [Sikos 2020].…”
Section: Related Workmentioning
confidence: 99%