{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T17:02:43Z","timestamp":1742403763429},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319736969"},{"type":"electronic","value":"9783319736976"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-73697-6_15","type":"book-chapter","created":{"date-parts":[[2018,1,5]],"date-time":"2018-01-05T02:53:43Z","timestamp":1515120823000},"page":"195-203","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An Overview of the Usage of Default Passwords"],"prefix":"10.1007","author":[{"given":"Brandon","family":"Knieriem","sequence":"first","affiliation":[]},{"given":"Xiaolu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Philip","family":"Levine","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Breitinger","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Baggili","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,6]]},"reference":[{"key":"15_CR1","unstructured":"Booker, L.: Brute force attack targets WordPress sites with default admin username (2013)"},{"key":"15_CR2","unstructured":"Carroll, R.: Breached healthcare.gov server still had default password (2014)"},{"key":"15_CR3","unstructured":"Casey, B.: Network security risks: the trouble with default passwords (2014)"},{"key":"15_CR4","unstructured":"Christey, S., Martin, R.A.: Vulnerability type distributions in cve. Mitre report, May 2007"},{"issue":"3","key":"15_CR5","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1201\/1086\/43327.12.3.20030701\/43626.7","volume":"12","author":"J Gordineer","year":"2003","unstructured":"Gordineer, J.: Blended threats: a new era in anti-virus protection. Inf. Syst. Secur. 12(3), 45\u201347 (2003)","journal-title":"Inf. Syst. Secur."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Grassi, G.: Digital identity guidelines. National Institute of Standards and Technology (2016)","DOI":"10.6028\/NIST.SP.800-63-3"},{"issue":"4","key":"15_CR7","doi-asserted-by":"crossref","first-page":"5","DOI":"10.22215\/timreview\/1066","volume":"7","author":"M Hypponen","year":"2017","unstructured":"Hypponen, M., Nyman, L.: The internet of (vulnerable) things: on hypponen\u2019s law, security engineering, and IoT legislation. Technol. Innov. Manag. Rev. 7(4), 5\u201311 (2017)","journal-title":"Technol. Innov. Manag. Rev."},{"key":"15_CR8","unstructured":"http:\/\/KrebsonSecurity.com . They hack because they can (2014)"},{"key":"15_CR9","unstructured":"Martins, F.: Creating strong password policy best practices (2014)"},{"key":"15_CR10","unstructured":"Northcutt, S.: The risk of default passwords (2007)"},{"key":"15_CR11","unstructured":"Pham, T.: Default passwords: breaching ATMs, highway signs and POS devices (2014)"},{"key":"15_CR12","unstructured":"Duo Security: Utah department of health (UDOH) breach (2012)"},{"key":"15_CR13","unstructured":"Microsoft Customer Support: An unsecured SQL server server that has a blank (NULL) system administrator password allows vulnerability to a worm (2005)"},{"key":"15_CR14","unstructured":"Symantec Security Response. Mirai: what you need to know about the botnet behind recent major DDoS attacks, Oct 2016"},{"issue":"2\u20133","key":"15_CR15","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1002\/sec.149","volume":"3","author":"P Traynor","year":"2010","unstructured":"Traynor, P., Butler, K., Enck, W., McDaniel, P., Borders, K.: Malnets: large-scale malicious networks via compromised wireless access points. Secur. Commun. Netw. 3(2\u20133), 102\u2013113 (2010)","journal-title":"Secur. Commun. Netw."},{"key":"15_CR16","unstructured":"Van Heerden, R.P., Vorster, J.S.: Statistical analysis of large passwords lists, used to optimize brute force attacks (2009)"},{"key":"15_CR17","unstructured":"Vijayan, J.: Weak passwords still the downfall of enterprise security (2012)"},{"key":"15_CR18","unstructured":"Vinton, K.: Data breach bulletin: home depot, healthcare.gov, JP morgan (2014)"},{"issue":"8","key":"15_CR19","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1016\/j.ijhcs.2007.03.007","volume":"65","author":"KPL Vu","year":"2007","unstructured":"Vu, K.P.L., Proctor, R.W., Bhargav-Spantzel, A., Tai, B.L.B., Cook, J., Schultz, E.E.: Improving password security and memorability to protect personal and organizational information. Int. J. Hum. Comput. Stud. 65(8), 744\u2013757 (2007)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"15_CR20","unstructured":"Westervelt, R.: Verizon data breach report finds employees at core of most attacks (2013)"},{"key":"15_CR21","unstructured":"Williams, C., Spanbauer, K.: Understanding password quality (2001)"},{"key":"15_CR22","unstructured":"Wisniewski: Naked security (2016)"},{"key":"15_CR23","unstructured":"Wright, J.: Oracle worm proof-of-concept (2005)"},{"issue":"5","key":"15_CR24","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MSP.2009.142","volume":"7","author":"S Zanero","year":"2009","unstructured":"Zanero, S.: Wireless malware propagation: a reality check. IEEE Secur. Priv. 7(5), 70\u201374 (2009)","journal-title":"IEEE Secur. Priv."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-73697-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T01:40:06Z","timestamp":1570585206000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-73697-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319736969","9783319736976"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-73697-6_15","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}