{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:09:39Z","timestamp":1754485779096,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031579158"},{"type":"electronic","value":"9783031579165"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57916-5_18","type":"book-chapter","created":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T03:10:10Z","timestamp":1712545810000},"page":"201-213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Non-interactive One-Time Password-Based Method to\u00a0Enhance the\u00a0Vault Security"],"prefix":"10.1007","author":[{"given":"Juarez","family":"Oliveira","sequence":"first","affiliation":[]},{"given":"Altair","family":"Santin","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Viegas","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Horchulhack","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,9]]},"reference":[{"key":"18_CR1","unstructured":"The penetration testing execution standard (2014). http:\/\/www.pentest-standard.org\/index.php\/Main_Page"},{"key":"18_CR2","unstructured":"Reconnaissance \u2013 tactic ta0043 (2020). https:\/\/attack.mitre.org\/tactics\/TA0043\/"},{"key":"18_CR3","unstructured":"Use alternate authentication material (2022). https:\/\/attack.mitre.org\/techniques\/T1550\/"},{"key":"18_CR4","unstructured":"CIS (2023). https:\/\/www.cisecurity.org\/controls"},{"key":"18_CR5","unstructured":"Fail2ban: ban hosts that cause multiple authentication errors (2023). https:\/\/github.com\/fail2ban\/fail2ban"},{"key":"18_CR6","unstructured":"Gramine - a library OS for unmodified applications (2023). https:\/\/gramineproject.io\/"},{"key":"18_CR7","unstructured":"HashiCorp developer (2023). https:\/\/developer.hashicorp.com\/"},{"key":"18_CR8","unstructured":"HVAC \u2013 HVAC 1.2.1 documentation (2023). https:\/\/hvac.readthedocs.io\/en\/stable\/"},{"key":"18_CR9","unstructured":"Intel software guard extensions \u2013 developer guide (2023). https:\/\/download.01.org\/intel-sgx\/latest\/linux-latest\/docs\/Intel_SGX_Developer_Guide.pdf"},{"key":"18_CR10","unstructured":"MITRE ATT &CK (2023). https:\/\/attack.mitre.org\/"},{"key":"18_CR11","unstructured":"National vulnerability database (2023). https:\/\/nvd.nist.gov\/"},{"key":"18_CR12","unstructured":"PyOTP (2023). https:\/\/pyauth.github.io\/pyotp\/"},{"key":"18_CR13","unstructured":"Remote services: SSH (2023). https:\/\/attack.mitre.org\/techniques\/T1021\/004\/"},{"key":"18_CR14","unstructured":"Cheng, H., Li, W., Wang, P., Chu, C.H., Liang, K.: Incrementally updateable honey password vaults. In: 30th USENIX Security 21, pp. 857\u2013874 (2021)"},{"key":"18_CR15","unstructured":"Consortium, C.C.: A technical analysis of confidential computing. Tech. rep. (2023). https:\/\/confidentialcomputing.io\/wp-content\/uploads\/sites\/10\/2023\/03\/CCC-A-Technical-Analysis-of-Confidential-Computing-v1.3_unlocked.pdf"},{"issue":"6","key":"18_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3456631","volume":"54","author":"S Fei","year":"2021","unstructured":"Fei, S., Yan, Z., Ding, W., Xie, H.: Security vulnerabilities of SGX and countermeasures: a survey. ACM Comput. Surv. 54(6), 1\u201336 (2021)","journal-title":"ACM Comput. Surv."},{"key":"18_CR17","unstructured":"Fisher, P.: Privileged access management (PAM) demystified (2023). https:\/\/www.oneidentity.com\/what-is-privileged-access-management\/"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Geremias, J., Viegas, E.K., Santin, A.O., Britto, A., Horchulhack, P.: Towards multi-view android malware detection through image-based deep learning. In: 2022 International Wireless Communications and Mobile Computing (IWCMC). IEEE (May 2022)","DOI":"10.1109\/IWCMC55113.2022.9824985"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Henricks, A., Kettani, H.: On data protection using multi-factor authentication. In: Proceedings of the 2019 International Conference on Information System and System Management. ISSM 2019, ACM (Oct 2019)","DOI":"10.1145\/3394788.3394789"},{"key":"18_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.103839","volume":"224","author":"P Horchulhack","year":"2024","unstructured":"Horchulhack, P., Viegas, E.K., Santin, A.O., Ramos, F.V., Tedeschi, P.: Detection of quality of service degradation on multi-tenant containerized services. J. Netw. Comput. Appl. 224, 103839 (2024)","journal-title":"J. Netw. Comput. Appl."},{"key":"18_CR21","unstructured":"Lambert, J.: Multi-factor authentication interception (2023). https:\/\/attack.mitre.org\/techniques\/T1111\/"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"dos Santos, R.R., Viegas, E.K., Santin, A.O.: A reminiscent intrusion detection model based on deep autoencoders and transfer learning. In: 2021 IEEE Global Communications Conference (GLOBECOM). IEEE (Dec 2021)","DOI":"10.1109\/GLOBECOM46510.2021.9685724"},{"key":"18_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103413","volume":"133","author":"RR dos Santos","year":"2023","unstructured":"dos Santos, R.R., Viegas, E.K., Santin, A.O., Tedeschi, P.: Federated learning for reliable model updates in network-based intrusion detection. Elsevier Comput. Secur. 133, 103413 (2023)","journal-title":"Elsevier Comput. Secur."},{"issue":"2","key":"18_CR24","doi-asserted-by":"publisher","first-page":"2040","DOI":"10.1109\/TNSM.2022.3207094","volume":"20","author":"RR dos Santos","year":"2023","unstructured":"dos Santos, R.R., Viegas, E.K., Santin, A.O., Cogo, V.V.: Reinforcement learning for intrusion detection: more model longness and fewer updates. IEEE Trans. Netw. Serv. Manage. 20(2), 2040\u20132055 (2023)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"14","key":"18_CR25","doi-asserted-by":"publisher","first-page":"2181","DOI":"10.3390\/electronics11142181","volume":"11","author":"H Taherdoost","year":"2022","unstructured":"Taherdoost, H.: Understanding cybersecurity frameworks and information security standards-a review and comprehensive overview. Electronics 11(14), 2181 (2022)","journal-title":"Electronics"},{"issue":"3","key":"18_CR26","doi-asserted-by":"publisher","first-page":"1659","DOI":"10.1007\/s10586-020-03209-9","volume":"24","author":"E Viegas","year":"2020","unstructured":"Viegas, E., Santin, A., Bachtold, J., Segalin, D., Stihler, M., Marcon, A., Maziero, C.: Enhancing service maintainability by monitoring and auditing SLA in cloud computing. Clust. Comput. 24(3), 1659\u20131674 (2020). https:\/\/doi.org\/10.1007\/s10586-020-03209-9","journal-title":"Clust. Comput."},{"key":"18_CR27","doi-asserted-by":"publisher","first-page":"38029","DOI":"10.1109\/ACCESS.2021.3063770","volume":"9","author":"L Wu","year":"2021","unstructured":"Wu, L., Cai, H.J., Li, H.: SGX-UAM: a secure unified access management scheme with one time passwords via intel SGX. IEEE Access 9, 38029\u201338042 (2021)","journal-title":"IEEE Access"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Xia, K., Luo, Y., Xu, X., Wei, S.: SGX-FPGA: trusted execution environment for CPU-FPGA heterogeneous architecture. In: 2021 58th ACM\/IEEE DAC (Dec 2021)","DOI":"10.1109\/DAC18074.2021.9586207"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57916-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T03:22:48Z","timestamp":1712546568000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57916-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031579158","9783031579165"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57916-5_18","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"9 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kitakyushu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}