{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:20:47Z","timestamp":1742923247854,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030170646"},{"type":"electronic","value":"9783030170653"}],"license":[{"start":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T00:00:00Z","timestamp":1554854400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-17065-3_28","type":"book-chapter","created":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T01:38:22Z","timestamp":1554773902000},"page":"278-287","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Warning of Affected Users About an Identity Leak"],"prefix":"10.1007","author":[{"given":"Timo","family":"Malderle","sequence":"first","affiliation":[]},{"given":"Matthias","family":"W\u00fcbbeling","sequence":"additional","affiliation":[]},{"given":"Sven","family":"Knauer","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Meier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,10]]},"reference":[{"key":"28_CR1","unstructured":"Bras, T.L.: [infographic] online overload - it\u2019s worse than you thought, July 2015. \n                  https:\/\/blog.dashlane.com\/infographic-online-overload-its-worse-than-you-thought\/\n                  \n                . Accessed 27 Sept 2018"},{"key":"28_CR2","unstructured":"Casal, J.: 1.4 billion clear text credentials discovered in a single database. A Medium Corporation - 4iQ, December 2017. \n                  https:\/\/medium.com\/4iqdelvedeep\/1-4-billion-clear-text-credentials-discovered-in-a-single-database-3131d0a1ae14\n                  \n                . Accessed 27 Sept 2018"},{"key":"28_CR3","unstructured":"Chia, J.M.: Hacked-Emails (2017). \n                  https:\/\/hacked-emails.com\/\n                  \n                . Accessed 27 Sept 2018"},{"key":"28_CR4","unstructured":"Corp, S.: LifeLock (2018). \n                  https:\/\/www.lifelock.com\/education\/4-lasting-effects-of-identity-theft\/\n                  \n                . Accessed 27 Sept 2018"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"DeBlasio, J., Savage, S., Voelker, G.M., Snoeren, A.C.: Tripwire: inferring internet site compromise. In: Proceedings of the 2017 Internet Measurement Conference, IMC 2017, pp. 341\u2013354. ACM, New York (2017)","DOI":"10.1145\/3131365.3131391"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Graupner, H., Jaeger, D., Cheng, F., Meinel, C.: Automated parsing and interpretation of identity leaks. In: Proceedings of the ACM International Conference on Computing Frontiers, CF 2016, pp. 127\u2013134. ACM, New York (2016)","DOI":"10.1145\/2903150.2903156"},{"issue":"2","key":"28_CR7","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1109\/TDSC.2016.2568187","volume":"15","author":"W Han","year":"2016","unstructured":"Han, W., Li, Z., Ni, M., Gu, G., Xu, W.: Shadow attacks based on password reuses: a quantitative empirical view. IEEE Trans. Dependable Secur. Comput. 15(2), 309\u2013320 (2016)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"28_CR8","unstructured":"Hasso-Plattner-Institut f\u00fcr Digital Engineering gGmbH: HPI Leak Checker (2017). \n                  https:\/\/sec.hpi.de\/leak-checker\n                  \n                . Accessed 27 Sept 2018"},{"key":"28_CR9","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-319-60876-1_16","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"O Heen","year":"2017","unstructured":"Heen, O., Neumann, C.: On the privacy impacts of publicly leaked password databases. In: Polychronakis, M., Meier, M. (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 347\u2013365. Springer International Publishing, Cham (2017)"},{"key":"28_CR10","unstructured":"Hunt, T.: have i been pwned? (2017). \n                  https:\/\/haveibeenpwned.com\n                  \n                . Accessed 27 Sept 2018"},{"key":"28_CR11","unstructured":"Hunt, T.: Inside the massive 711 million record onliner spambot dump (2017). \n                  https:\/\/www.troyhunt.com\/inside-the-massive-711-million-record-onliner-spambot-dump\/\n                  \n                . Accessed 27 Sept 2018"},{"key":"28_CR12","unstructured":"IdentityForce, I.: IdentityForce (2018). \n                  https:\/\/www.lifelock.com\/education\/4-lasting-effects-of-identity-theft\/\n                  \n                . Accessed 27 Sept 2018"},{"key":"28_CR13","unstructured":"Jaeger, D., Pelchen, C., Graupner, H., Cheng, F., Meinel, C.: Analysis of publicly leaked credentials and the long story of password (re-)use. In: Proceedings of the 11th International Conference on Passwords (PASSWORDS2016). Springer, Bochum (2016)"},{"key":"28_CR14","unstructured":"Johansen, A.G.: 4 lasting effects of identity theft (2018). \n                  https:\/\/lifelock.com\/education\/4-lasting-effects-of-identity-theft\/\n                  \n                . Accessed 27 Sept 2018"},{"key":"28_CR15","unstructured":"Lord, N.: Uncovering password habits: are users\u2019 password security habits improving? (infographic), September 2017. \n                  https:\/\/digitalguardian.com\/blog\/uncovering-password-habits-are-users-password-security-habits-improving-infographic\n                  \n                . Accessed 27 Sept 2018"},{"key":"28_CR16","unstructured":"Experian Ltd.: Experian (2018). \n                  https:\/\/www.experian.co.uk\n                  \n                . Accessed 27 Sept 2018"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Malderle, T., W\u00fcbbeling, M., Knauer, S., Sykosch, A., Meier, M.: Gathering and analyzing identity leaks for a proactive warning of affected users. In: Proceedings of the 15th ACM International Conference on Computing Frontiers, CF 2018, pp. 208\u2013211. ACM, New York (2018)","DOI":"10.1145\/3203217.3203269"},{"key":"28_CR18","unstructured":"Malm, S.: Two suicides are linked to Ashley Madison leak: Texas police chief takes his own life just days after his email is leaked in cheating website hack (2015). \n                  https:\/\/www.lifelock.com\/education\/4-lasting-effects-of-identity-theft\/\n                  \n                . Accessed 27 Sept 2018"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Onaolapo, J., Mariconti, E., Stringhini, G.: What happens after you are pwnd: understanding the use of leaked webmail credentials in the wild. In: Proceedings of the 2016 Internet Measurement Conference, IMC 2016, pp. 65\u201379 (2016)","DOI":"10.1145\/2987443.2987475"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Subrayan, S., Mugilan, S., Sivanesan, B., Kalaivani, S.: Multi-factor authentication scheme for shadow attacks in social network. In: 2017 International Conference on Technical Advancements in Computers and Communications (ICTACC), pp. 36\u201340 (2017)","DOI":"10.1109\/ICTACC.2017.19"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., Markov, Y., Comanescu, O., Eranti, V., Moscicki, A., Margolis, D., Paxson, V., Bursztein, E.: Data breaches, phishing, or malware?: Understanding the risks of stolen credentials. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, pp. 1421\u20131434. ACM, New York (2017)","DOI":"10.1145\/3133956.3134067"},{"key":"28_CR22","unstructured":"vigilante: vigilante.pw (2017). \n                  https:\/\/vigilante.pw\/\n                  \n                . Accessed 27 Sept 2018"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-17065-3_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T04:11:16Z","timestamp":1558152676000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-17065-3_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,10]]},"ISBN":["9783030170646","9783030170653"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-17065-3_28","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,4,10]]},"assertion":[{"value":"10 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SoCPaR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Soft Computing and Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Porto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socpar2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/socpar18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}