Browsing by Author "Vargas Martin, Miguel"
Now showing items 1-13 of 13
-
Assessing the memorability of familiar vocabulary for system assigned passphrases
Jagadeesh, Noopa (2021-08-01)Text-based secrets are still the most commonly used authentication mechanism in information systems. Initially introduced as more secure authentication keys that people could recall, passphrases are tokens consisting of ... -
Cluster techniques and prediction models for a digital media learning environment
Fernandez Espinosa, Arturo (2012-08-01)The present work applies well-known data mining techniques in a digital learning media environment in order to identify groups of students based on their pro le. We generate identi able clusters where some interesting ... -
Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt
Garcia, Ricardo Rodriguez (2013-03-01)The lack of encryption of data at rest or in motion is one of the top 10 database vulnerabilities according to team SHATTER [72]. In the quest to improve the security landscape, we identify an opportunity area: two tools ... -
Detecting and preventing the electronic transmission of illicit images
Ibrahim, Amin Abdurahman (2009-04-01)The sexual exploitation of children remains a very serious problem and is rapidly increasing globally through the use of the Internet. This work focuses on the current methods employed by criminals to generate and distribute ... -
Do extroverts create stronger passwords?
Maraj, Amit (2018-04-01)We investigate the relationship between personality types and the strength of created and selected passwords. For this purpose, we conducted an experiment on Amazon’s Mechanical Turk, with 510 participants. Participants ... -
Hamming distance as a metric for the detection of side channel in 802.11 wireless communications
Chea, Visal (2015-04-01)A wireless network can be exploited in many ways. One way is through intentionally corrupting the Frame Check Sequence (FCS) field by using a different Cyclic Redundancy Check (CRC) polynomial in order to create a side ... -
Raising the bar for password crackers: improving the quality of honeywords with deep neural networks
Yu, Fangyi (2022-12-01)Honeywords are fictitious passwords inserted into databases in order to identify password breaches. Producing honeywords that are difficult to distinguish from actual passwords automatically is a time-consuming and ... -
SegmentPerturb: effective black-box hidden voice attack on commercial ASR systems via selective deletion
Wang, Ganyu (2021-08-01)Voice control systems continue becoming more pervasive as they are deployed in mobile phones, smart home devices, automobiles, etc. Commonly, voice control systems have high privileges on the device, such as making a call ... -
Spectrum sensing based on capon power spectral density estimation
Mohammed, Ola Ashour (2015-04-01)Cognitive radio (CR) technology has evolved to solve the spectrum scarcity problem and improve spectrum utilization. Spectrum sensing is a CR function that allows secondary users to efficiently utilize the spectrum without ... -
A study of password recall, perceived memorability, and strength using BCIs
Alomari, Ruba (2018-04-01)Passwords are considered the most common method of authentication and studies are frequently conducted to understand users' password habits. In this thesis, we run two empirical studies that provide information to further ... -
A study of undergraduate health science students' perceptions, navigational choices, and learning outcomes with IPSims simulative learning environment
Regis, Meaghen (2012-10-01)Simulated learning environments are becoming a more popular format for the delivery of healthcare education. These environments include but are not limited to simulated online learning environments, serious games, task ... -
Towards implicit learning of system-assigned authentication tokens
Joudaki, Zeinab (2018-02-01)People tend to choose predictable passwords which are vulnerable to guessing attacks. To combat the security issue, system-assigned authentication keys were proposed, but coming at a cost to memorability. In this thesis, ... -
Using consumer-grade brain-computer interface devices to capture and detect unaware facial recognitions
Bellman, Christopher (2017-08-01)The brain's natural reaction to viewing and processing faces in an aware manner is an area of research that has been explored for previously, however the brain's unaware reactions to these stimuli prove to be fairly less ...