MJCS 2021
DOI: 10.58496/mjcs/2021/002
|View full text |Cite
|
Sign up to set email alerts
|

Harmony Search for Security Enhancement

Abstract: The honeyword system can be considered a mechanism for detecting passwords aiming to develop hashed password security via creating a password cracking easier to be detected. A lot of false passwords come with true passwords for forming the false and true passwords for all users. When a hacker logs in and uses a honeyword, a silent alarm trigger illustrates that the honeyword system could be compromised. A lot of mechanisms of honeyword generating have been submitted and all of them have a defect in the generat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 13 publications
(13 reference statements)
0
2
0
Order By: Relevance
“…However, deep learning measures the performance of systems in addressing a problem, whether the examples are one-or multi-dimensional. Scholars are actively trying to find solutions to many issues in the field of cybersecurity by using deep learning methods [85][86][87]. These methods obtain a very high accuracy of more than 97% in identifying attack messages and blocking their display on vehicle screens.…”
Section: Deep Learning In Cybersecuritymentioning
confidence: 99%
“…However, deep learning measures the performance of systems in addressing a problem, whether the examples are one-or multi-dimensional. Scholars are actively trying to find solutions to many issues in the field of cybersecurity by using deep learning methods [85][86][87]. These methods obtain a very high accuracy of more than 97% in identifying attack messages and blocking their display on vehicle screens.…”
Section: Deep Learning In Cybersecuritymentioning
confidence: 99%
“…Since it takes into consideration boundless downloads of pilfered software, open-source codes, and advances and markets pilfered duplicates, it represents a serious risk to internet security. Every year, it develops rapidly and makes the software area experience huge monetary misfortunes [7]. As indicated by the Business Software Partnership (BSA) 2016 exploration, there is an expected 39% public software robbery rate, which causes yearly financial misfortunes of up to $52.2 billion.…”
Section: Introductionmentioning
confidence: 99%