Cite

1. Mukthineni, V., R. Mukthineni, O. Sharma, S. J. Narayanan. Face Authenticated Hand Gesture Based Human Computer Interaction for Desktops. – Cybernernetics and Information Technologies., Vol. 20, 2020, No 4, pp. 74-89.10.2478/cait-2020-0048 Search in Google Scholar

2. M. Lehto, P. Neittaanmäki, Eds. Cyber Security: Analytics, Technology and Automation. – Cham, Springer International Publishing, Vol. 78. 2015.10.1007/978-3-319-18302-2 Search in Google Scholar

3. Genç, Z. A., S. Kardaş, M. S. Kiraz. Examination of a New Defense Mechanism: Honeywords. – In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). G. P. Hancke, E. Damiani, Eds. Cham, Springer International Publishing. Vol. 10741. 2018, pp. 130-139. Search in Google Scholar

4. Kusuma, A. B., Y. R. Pramadi. Implementation of Honeywords as a Codeigniter Library for a Solution to Password-Cracking Detection. – IOP Conf. Ser. Mater. Sci. Eng., Vol. 508, May 2019, No 1, p. 012134. DOI: 10.1088/1757-899X/508/1/012134.10.1088/1757-899X/508/1/012134 Search in Google Scholar

5. Win, T., K. S. M. Moe. Protecting Private Data Using Improved Honey Encryption and Honeywords Generation Algorithm. – Adv. Sci. Technol. Eng. Syst., Vol. 3, 2018, No 5, pp. 311-320. DOI: 10.25046/aj030537.10.25046/aj030537 Search in Google Scholar

6. Chakraborty, N., S. Mondal. Towards Improving Storage Cost and Security Features of Honeyword Based Approaches. – Procedia Comput. Sci., Vol. 93, 2016, No September, pp. 799-807. DOI: 10.1016/j.procs.2016.07.298.10.1016/j.procs.2016.07.298 Search in Google Scholar

7. Wang, R., H. Chen, J. Sun. Phoney: Protecting Password Hashes with Threshold Cryptology and Honeywords. – Int. J. Embed. Syst., Vol. 8, 2016, No 2-3, pp. 146-154. DOI: 10.1504/IJES.2016.076108.10.1504/IJES.2016.076108 Search in Google Scholar

8. Palaniappan, S., V. Parthipan, S. Stewart Kirubakaran, R. Johnson. Secure User Authentication Using Honeywords. – Lecture Notes on Data Engineering and Communications Technologies, Vol. 31, 2020, pp. 896-903.10.1007/978-3-030-24643-3_105 Search in Google Scholar

9. Homayouni, S. M., D. B. M. M. Fontes. Metaheuristic Algorithms – Metaheuristics for Maritime Operations. Hoboken, NJ, USA, John Wiley & Sons, Inc., 2018, pp. 21-38.10.1002/9781119483151.ch2 Search in Google Scholar

10. Tezel, B. T., A. Mert. A Cooperative System for Metaheuristic Algorithms. – Expert Syst. Appl., Vol. 165, 2021, No May 2020, p. 113976. DOI: 10.1016/j.eswa.2020.113976.10.1016/j.eswa.2020.113976 Search in Google Scholar

11. Toshev, A. Particle Swarm Optimization and Tabu Search Hybrid Algorithm for Flexible Job Shop Scheduling Problem – Analysis of Test Results. – Cybernernetics and Information Technologies, Vol. 19, 2019, No 4, pp. 26-44.10.2478/cait-2019-0034 Search in Google Scholar

12. Kumar, A., D. Kumar, S. K. Jarial. A Review on Artificial Bee Colony Algorithms and Their Applications to Data Clustering. – Cybernernetics and Information Technologies, Vol. 17, 2017, No 3, pp. 3-28.10.1515/cait-2017-0027 Search in Google Scholar

13. Green, D., A. Aleti, J. Garcia. The Nature of Nature: Why Nature-Inspired Algorithms Work. – Model. Optim. Sci. Technol., Vol. 10, 2017, pp. 1-27. DOI: 10.1007/978-3-319-50920-4_1.10.1007/978-3-319-50920-4_1 Search in Google Scholar

14. Al-Obaidi, A. T. S., H. S. Abdullah, Z. O. Ahmed. Meerkat Clan Algorithm: A New Swarm Intelligence Algorithm. – Indonesian Journal of Electrical Engineering and Computer Science, Vol. 10, 2018, No 1. pp. 354-360. DOI: 10.11591/ijeecs.v10.i1.10.11591/ijeecs.v10.i1 Search in Google Scholar

15. Abd Alradha Alsaidi, S. A., D. K. Muhsen, S. M. Ali. Improved Scatter Search Algorithm Based on Meerkat Clan Algorithm to Solve NP-Hard Problems. – Period. Eng. Nat. Sci., Vol. 8, 2020, No 3. DOI: 10.21533/pen.v8i3.1563. Search in Google Scholar

16. Jameel, N., H. S. Abdullah. A Proposed Intelligent Features Selection Method Using Meerkat Clan Algorithm. – J. Phys. Conf. Ser., Vol. 1804, February 2021, No 1, p. 012061. DOI: 10.1088/1742-6596/1804/1/012061.10.1088/1742-6596/1804/1/012061 Search in Google Scholar

17. Juels, A., R. L. Rivest. Honeywords: Making Password-Cracking Detectable. – In: Proc. of 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS’13), 2013, No October 2015, pp. 145-160. DOI: 10.1145/2508859.2516671.10.1145/2508859.2516671 Search in Google Scholar

18. Erguler, I. Achieving Flatness: Selecting the Honeywords from Existing User Passwords. – IEEE Trans. Dependable Secur. Comput., Vol. 13, March 2015, No 2, pp. 284-295. DOI: 10.1109/TDSC.2015.2406707.10.1109/TDSC.2015.2406707 Search in Google Scholar

19. Chakraborty, N., S. Mondal. On Designing a Modified-UI Based Honeyword Generation Approach for Overcoming the Existing Limitations. – Comput. Secur., Vol. 66, 2017, pp. 155-168. DOI: 10.1016/j.cose.2017.01.011.10.1016/j.cose.2017.01.011 Search in Google Scholar

20. Akshima, A., D. Chang, A. Goel, S. Mishra, S. K. Sanadhya. Generation of Secure and Reliable Honeywords, Preventing False Detection. – IEEE Trans. Dependable Secur. Comput., Vol. 5971, 2018, No c, pp. 1-13. DOI: 10.1109/TDSC.2018.2824323.10.1109/TDSC.2018.2824323 Search in Google Scholar

21. Akif, O. Z., A. F. Sabeeh, G. J. Rodgers, H. S. Al-Raweshidy. Achieving Flatness: Honeywords Generation Method for Passwords Based on User Behaviours. – Int. J. Adv. Comput. Sci. Appl., Vol. 10, 2019, No 3, pp. 28-37. DOI: 10.14569/IJACSA.2019.0100305.10.14569/IJACSA.2019.0100305 Search in Google Scholar

22. Brindtha, J., K. R. Hithaeishini, R. Komala, G. Abirami, U. Arul. Identification and Detecting of Attacker in a Purchase Portal Using Honeywords. – In: Proc. of 3rd IEEE Int. Conf. Sci. Technol. Eng. Manag. (ICONSTEM’17), Vol. 2018-Janua, 2017, pp. 389-393. DOI: 10.1109/ICONSTEM.2017.8261414.10.1109/ICONSTEM.2017.8261414 Search in Google Scholar

23. Genç, Z. A., G. Lenzini, P. Y. A. Ryan, I. Vazquez Sandoval. A Critical Security Analysis of the Password-Based Authentication Honeywords System under Code-Corruption Attack. – Communications in Computer and Information Science, Vol. 977, 2019, pp. 125-151.10.1007/978-3-030-25109-3_7 Search in Google Scholar

24. Genç, Z. A., G. Lenzini, P. Y. A. Ryan, I. V. Sandoval. A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. – In: Proc. of 4th International Conference on Information Systems Security and Privacy, Vol. 2018-Janua, 2018, No Icissp, pp. 83-95. DOI: 10.5220/0006609100830095.10.5220/0006609100830095 Search in Google Scholar

25. Catuogno, L., A. Castiglione, F. Palmieri. A Honeypot System with Honeyword-Driven Fake Interactive Sessions. – In: Proc. of 2015 Int. Conf. High Perform. Comput. Simulation (HPCS’15), 2015, pp. 187-194. DOI: 10.1109/HPCSim.2015.7237039.10.1109/HPCSim.2015.7237039 Search in Google Scholar

26. Nathezhtha, T., V. Vaidehi. Honeyword with Salt-Chlorine Generator to Enhance Security of Cloud User Credentials. – Commun. Comput. Inf. Sci., Vol. 746, 2017, pp. 159-169. DOI: 10.1007/978-981-10-6898-0_13.10.1007/978-981-10-6898-0_13 Search in Google Scholar

27. Moe, K. S. M., T. Win. Improved Hashing and Honey-Based Stronger Password Prevention against Brute Force Attack. – In: 2017 International Symposium on Electronics and Smart Devices (ISESD’17), Vol. 2018-Janua, October 2017, pp. 1-5. DOI: 10.1109/ISESD.2017.8253295.10.1109/ISESD.2017.8253295 Search in Google Scholar

eISSN:
1314-4081
Idioma:
Inglés
Calendario de la edición:
4 veces al año
Temas de la revista:
Computer Sciences, Information Technology