Now showing items 3-6 of 6

    • Filtering honeywords using probabilistic context free grammar 

      Tanniru, Alekhya (2023-10-01)
      With the growing prevalence of cyber threats, effective password policies have become crucial for safeguarding sensitive information. Traditional password-based authentication techniques are open to a number of threats. ...
    • Guarding the gate: using honeywords to enhance authentication security 

      Koppada, Gowtham (2023-10-01)
      A honeyword (false password) can be defined as a duplicate password (rearranged) resembling the same characteristics of the original password. It is very challenging for any cyberpunk to distinguish between a real password ...
    • Matching expectations and reality in AI systems - cybersecurity use case 

      Defo Aymar, Tala (2023-04-01)
      Artificial intelligence (AI) is a growing field in computer science which develops intelligent systems capable of performing things that a human mind can do. The manufacturers of security systems integrate AI capabilities ...
    • Systems and models for secure fallback authentication 

      Addas, Alaadin (2018-12-01)
      Fallback authentication (FA) techniques such as security questions, Email resets, and SMS resets have significant security flaws that easily undermine the primary method of authentication. Security questions have been shown ...