[
1. Mukthineni, V., R. Mukthineni, O. Sharma, S. J. Narayanan. Face Authenticated Hand Gesture Based Human Computer Interaction for Desktops. – Cybernernetics and Information Technologies., Vol. 20, 2020, No 4, pp. 74-89.10.2478/cait-2020-0048
]Search in Google Scholar
[
2. M. Lehto, P. Neittaanmäki, Eds. Cyber Security: Analytics, Technology and Automation. – Cham, Springer International Publishing, Vol. 78. 2015.10.1007/978-3-319-18302-2
]Search in Google Scholar
[
3. Genç, Z. A., S. Kardaş, M. S. Kiraz. Examination of a New Defense Mechanism: Honeywords. – In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). G. P. Hancke, E. Damiani, Eds. Cham, Springer International Publishing. Vol. 10741. 2018, pp. 130-139.
]Search in Google Scholar
[
4. Kusuma, A. B., Y. R. Pramadi. Implementation of Honeywords as a Codeigniter Library for a Solution to Password-Cracking Detection. – IOP Conf. Ser. Mater. Sci. Eng., Vol. 508, May 2019, No 1, p. 012134. DOI: 10.1088/1757-899X/508/1/012134.10.1088/1757-899X/508/1/012134
]Search in Google Scholar
[
5. Win, T., K. S. M. Moe. Protecting Private Data Using Improved Honey Encryption and Honeywords Generation Algorithm. – Adv. Sci. Technol. Eng. Syst., Vol. 3, 2018, No 5, pp. 311-320. DOI: 10.25046/aj030537.10.25046/aj030537
]Search in Google Scholar
[
6. Chakraborty, N., S. Mondal. Towards Improving Storage Cost and Security Features of Honeyword Based Approaches. – Procedia Comput. Sci., Vol. 93, 2016, No September, pp. 799-807. DOI: 10.1016/j.procs.2016.07.298.10.1016/j.procs.2016.07.298
]Search in Google Scholar
[
7. Wang, R., H. Chen, J. Sun. Phoney: Protecting Password Hashes with Threshold Cryptology and Honeywords. – Int. J. Embed. Syst., Vol. 8, 2016, No 2-3, pp. 146-154. DOI: 10.1504/IJES.2016.076108.10.1504/IJES.2016.076108
]Search in Google Scholar
[
8. Palaniappan, S., V. Parthipan, S. Stewart Kirubakaran, R. Johnson. Secure User Authentication Using Honeywords. – Lecture Notes on Data Engineering and Communications Technologies, Vol. 31, 2020, pp. 896-903.10.1007/978-3-030-24643-3_105
]Search in Google Scholar
[
9. Homayouni, S. M., D. B. M. M. Fontes. Metaheuristic Algorithms – Metaheuristics for Maritime Operations. Hoboken, NJ, USA, John Wiley & Sons, Inc., 2018, pp. 21-38.10.1002/9781119483151.ch2
]Search in Google Scholar
[
10. Tezel, B. T., A. Mert. A Cooperative System for Metaheuristic Algorithms. – Expert Syst. Appl., Vol. 165, 2021, No May 2020, p. 113976. DOI: 10.1016/j.eswa.2020.113976.10.1016/j.eswa.2020.113976
]Search in Google Scholar
[
11. Toshev, A. Particle Swarm Optimization and Tabu Search Hybrid Algorithm for Flexible Job Shop Scheduling Problem – Analysis of Test Results. – Cybernernetics and Information Technologies, Vol. 19, 2019, No 4, pp. 26-44.10.2478/cait-2019-0034
]Search in Google Scholar
[
12. Kumar, A., D. Kumar, S. K. Jarial. A Review on Artificial Bee Colony Algorithms and Their Applications to Data Clustering. – Cybernernetics and Information Technologies, Vol. 17, 2017, No 3, pp. 3-28.10.1515/cait-2017-0027
]Search in Google Scholar
[
13. Green, D., A. Aleti, J. Garcia. The Nature of Nature: Why Nature-Inspired Algorithms Work. – Model. Optim. Sci. Technol., Vol. 10, 2017, pp. 1-27. DOI: 10.1007/978-3-319-50920-4_1.10.1007/978-3-319-50920-4_1
]Search in Google Scholar
[
14. Al-Obaidi, A. T. S., H. S. Abdullah, Z. O. Ahmed. Meerkat Clan Algorithm: A New Swarm Intelligence Algorithm. – Indonesian Journal of Electrical Engineering and Computer Science, Vol. 10, 2018, No 1. pp. 354-360. DOI: 10.11591/ijeecs.v10.i1.10.11591/ijeecs.v10.i1
]Search in Google Scholar
[
15. Abd Alradha Alsaidi, S. A., D. K. Muhsen, S. M. Ali. Improved Scatter Search Algorithm Based on Meerkat Clan Algorithm to Solve NP-Hard Problems. – Period. Eng. Nat. Sci., Vol. 8, 2020, No 3. DOI: 10.21533/pen.v8i3.1563.
]Search in Google Scholar
[
16. Jameel, N., H. S. Abdullah. A Proposed Intelligent Features Selection Method Using Meerkat Clan Algorithm. – J. Phys. Conf. Ser., Vol. 1804, February 2021, No 1, p. 012061. DOI: 10.1088/1742-6596/1804/1/012061.10.1088/1742-6596/1804/1/012061
]Search in Google Scholar
[
17. Juels, A., R. L. Rivest. Honeywords: Making Password-Cracking Detectable. – In: Proc. of 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS’13), 2013, No October 2015, pp. 145-160. DOI: 10.1145/2508859.2516671.10.1145/2508859.2516671
]Search in Google Scholar
[
18. Erguler, I. Achieving Flatness: Selecting the Honeywords from Existing User Passwords. – IEEE Trans. Dependable Secur. Comput., Vol. 13, March 2015, No 2, pp. 284-295. DOI: 10.1109/TDSC.2015.2406707.10.1109/TDSC.2015.2406707
]Search in Google Scholar
[
19. Chakraborty, N., S. Mondal. On Designing a Modified-UI Based Honeyword Generation Approach for Overcoming the Existing Limitations. – Comput. Secur., Vol. 66, 2017, pp. 155-168. DOI: 10.1016/j.cose.2017.01.011.10.1016/j.cose.2017.01.011
]Search in Google Scholar
[
20. Akshima, A., D. Chang, A. Goel, S. Mishra, S. K. Sanadhya. Generation of Secure and Reliable Honeywords, Preventing False Detection. – IEEE Trans. Dependable Secur. Comput., Vol. 5971, 2018, No c, pp. 1-13. DOI: 10.1109/TDSC.2018.2824323.10.1109/TDSC.2018.2824323
]Search in Google Scholar
[
21. Akif, O. Z., A. F. Sabeeh, G. J. Rodgers, H. S. Al-Raweshidy. Achieving Flatness: Honeywords Generation Method for Passwords Based on User Behaviours. – Int. J. Adv. Comput. Sci. Appl., Vol. 10, 2019, No 3, pp. 28-37. DOI: 10.14569/IJACSA.2019.0100305.10.14569/IJACSA.2019.0100305
]Search in Google Scholar
[
22. Brindtha, J., K. R. Hithaeishini, R. Komala, G. Abirami, U. Arul. Identification and Detecting of Attacker in a Purchase Portal Using Honeywords. – In: Proc. of 3rd IEEE Int. Conf. Sci. Technol. Eng. Manag. (ICONSTEM’17), Vol. 2018-Janua, 2017, pp. 389-393. DOI: 10.1109/ICONSTEM.2017.8261414.10.1109/ICONSTEM.2017.8261414
]Search in Google Scholar
[
23. Genç, Z. A., G. Lenzini, P. Y. A. Ryan, I. Vazquez Sandoval. A Critical Security Analysis of the Password-Based Authentication Honeywords System under Code-Corruption Attack. – Communications in Computer and Information Science, Vol. 977, 2019, pp. 125-151.10.1007/978-3-030-25109-3_7
]Search in Google Scholar
[
24. Genç, Z. A., G. Lenzini, P. Y. A. Ryan, I. V. Sandoval. A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. – In: Proc. of 4th International Conference on Information Systems Security and Privacy, Vol. 2018-Janua, 2018, No Icissp, pp. 83-95. DOI: 10.5220/0006609100830095.10.5220/0006609100830095
]Search in Google Scholar
[
25. Catuogno, L., A. Castiglione, F. Palmieri. A Honeypot System with Honeyword-Driven Fake Interactive Sessions. – In: Proc. of 2015 Int. Conf. High Perform. Comput. Simulation (HPCS’15), 2015, pp. 187-194. DOI: 10.1109/HPCSim.2015.7237039.10.1109/HPCSim.2015.7237039
]Search in Google Scholar
[
26. Nathezhtha, T., V. Vaidehi. Honeyword with Salt-Chlorine Generator to Enhance Security of Cloud User Credentials. – Commun. Comput. Inf. Sci., Vol. 746, 2017, pp. 159-169. DOI: 10.1007/978-981-10-6898-0_13.10.1007/978-981-10-6898-0_13
]Search in Google Scholar
[
27. Moe, K. S. M., T. Win. Improved Hashing and Honey-Based Stronger Password Prevention against Brute Force Attack. – In: 2017 International Symposium on Electronics and Smart Devices (ISESD’17), Vol. 2018-Janua, October 2017, pp. 1-5. DOI: 10.1109/ISESD.2017.8253295.10.1109/ISESD.2017.8253295
]Search in Google Scholar