{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:41:39Z","timestamp":1772642499741,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s10922-021-09620-w","type":"journal-article","created":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T09:07:27Z","timestamp":1634461647000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["PassMon: A Technique for Password Generation and Strength Estimation"],"prefix":"10.1007","volume":"30","author":[{"given":"Sanjay","family":"Murmu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8313-6354","authenticated-orcid":false,"given":"Harsh","family":"Kasyap","sequence":"additional","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,17]]},"reference":[{"issue":"4","key":"9620_CR1","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1016\/j.cose.2012.02.003","volume":"31","author":"H Kim","year":"2012","unstructured":"Kim, H., Huh, J.H.: Pin selection policies: are they really effective? Comput. Secur. 31(4), 484\u2013496 (2012)","journal-title":"Comput. Secur."},{"key":"9620_CR2","doi-asserted-by":"crossref","unstructured":"Nandakumar, K., Nagar, A., Jain, A.K.: Hardening fingerprint fuzzy vault using password. In: Proceedings of the International Conference on Biometrics, pp. 927\u2013937. Springer (2007)","DOI":"10.1007\/978-3-540-74549-5_97"},{"issue":"3","key":"9620_CR3","doi-asserted-by":"publisher","first-page":"37","DOI":"10.3390\/computers7030037","volume":"7","author":"MG Galterio","year":"2018","unstructured":"Galterio, M.G., Shavit, S.A., Hayajneh, T.: A review of facial biometrics security for smart devices. Computers 7(3), 37 (2018)","journal-title":"Computers"},{"issue":"11","key":"9620_CR4","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1109\/TIFS.2017.2721359","volume":"12","author":"D Wang","year":"2017","unstructured":"Wang, D., Cheng, H., Wang, P., Huang, X., Jian, G.: Zipf\u2019s law in passwords. IEEE Trans. Inf. Forensics Secur. 12(11), 2776\u20132791 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9620_CR5","doi-asserted-by":"crossref","unstructured":"Wang, D., Wang, P.: The emperor\u2019s new password creation policies. In: Proceedings of the European Symposium on Research in Computer Security, pp. 456\u2013477. Springer (2015)","DOI":"10.1007\/978-3-319-24177-7_23"},{"key":"9620_CR6","doi-asserted-by":"crossref","unstructured":"Wang, D., He, D., Cheng, H., Wang, P.: fuzzypsm: a new password strength meter using fuzzy probabilistic context-free grammars. In: Proceedings of the 2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 595\u2013606 (2016)","DOI":"10.1109\/DSN.2016.60"},{"key":"9620_CR7","first-page":"02","volume":"101757","author":"P Doucek","year":"2020","unstructured":"Doucek, P., Pavl\u00edek, L., Sedl\u00e1\u010dek, J., Nedomov\u00e1, L.: Adaptation of password strength estimators to a non-English environment-the CZech experience. Comput. Secur. 101757, 02 (2020)","journal-title":"Comput. Secur."},{"key":"9620_CR8","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., Medeiros, B., Glodek, B.: Password cracking using probabilistic context-free grammars. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, pp. 391\u2013405 (2009)","DOI":"10.1109\/SP.2009.8"},{"key":"9620_CR9","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets. Adv. Neural Inf. Process. Syst. 27 (2014)"},{"key":"9620_CR10","unstructured":"Hitaj, B., Gasti, P., Ateniese, G., P\u00e9rez-Cruz, F.: Passgan: a deep learning approach for password guessing. CoRR, abs\/1709.00440 (2017)"},{"key":"9620_CR11","unstructured":"Donahue, J., Kr\u00e4henb\u00fchl, P., and Darrell, T.: Adversarial feature learning. CoRR, abs\/1605.09782 (2016)"},{"key":"9620_CR12","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., Collins, M., Stern, H.: Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 162\u2013175 (2010)","DOI":"10.1145\/1866307.1866327"},{"key":"9620_CR13","doi-asserted-by":"crossref","unstructured":"Wang, D., Zhang, Z., Wang, P., Yan, J., Huang, X.: Targeted online password guessing: An underestimated threat. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1242\u20131254 (2016)","DOI":"10.1145\/2976749.2978339"},{"key":"9620_CR14","unstructured":"Wang, D., Wang, P., He, D., Tian, Y.: Birthday, name and bifacial-security: understanding passwords of Chinese web users. In: Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), pp. 1537\u20131555 (2019)"},{"key":"9620_CR15","unstructured":"Flor\u00eancio, D., Herley, C., and Van\u00a0Oorschot, P.C .: An administrator\u2019s guide to internet password research. In: Proceedings of the 28th Large Installation System Administration Conference (LISA14), pp. 44\u201361 (2014)"},{"key":"9620_CR16","unstructured":"Van\u00a0Heerden, R.P., Vorster, J.S.: Using Markov models to crack passwords. In: Proceedings of the 3rd International Conference on Information Warfare and Security: Peter Kiewit Institute, University of Nebraska, Omaha, USA, pp. 24\u201325 (2008)"},{"key":"9620_CR17","unstructured":"Yazdi, S.H.: Probabilistic context-free grammar based password cracking: attack, defense and applications. Comput. Sci. (2015)"},{"key":"9620_CR18","unstructured":"Melicher, W., Ur, B., Segreti, S.M., Komanduri, S., Bauer, L., Christin, N., Cranor, L.F.: Fast, lean, and accurate: modeling password guessability using neural networks. In: Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), pp. 175\u2013191, USENIX Association, Austin, TX (2016)"},{"key":"9620_CR19","doi-asserted-by":"crossref","unstructured":"Bo\u0161njak, L., Sre\u0161, J., Brumen, B.: Brute-force and dictionary attack on hashed real-world passwords. In: Proceedings of the 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1161\u20131166 (018)","DOI":"10.23919\/MIPRO.2018.8400211"},{"key":"9620_CR20","doi-asserted-by":"crossref","unstructured":"Zoebisch, F., Vielhauer, C.: A test tool to support brute-force online and offline signature forgery tests on mobile devices. In: 2003 International Conference on Multimedia and Expo. ICME \u201903. Proceedings (Cat. No. 03TH8698), vol. 3, pp. III\u2013225 (2003)","DOI":"10.1109\/ICME.2003.1221289"},{"key":"9620_CR21","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-319-27659-5_16","volume-title":"Information Security","author":"D Wang","year":"2015","unstructured":"Wang, D., Wang, P.: Offline dictionary attack on password authentication schemes using smart cards. In: Desmedt, Y. (ed.) Information Security, pp. 221\u2013237. Springer International Publishing, Cham (2015)"},{"key":"9620_CR22","doi-asserted-by":"crossref","unstructured":"Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. In: Proceedings of the CCS \u201999 (1999)","DOI":"10.1145\/319709.319720"},{"key":"9620_CR23","doi-asserted-by":"crossref","unstructured":"Y\u0131ld\u0131r\u0131m, M., Mackie, I.: Encouraging users to improve password security and memorability. Int. J. Inf. Secur. 18(6), 741\u2013759 (2019)","DOI":"10.1007\/s10207-019-00429-y"},{"key":"9620_CR24","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.ijhcs.2019.02.003","volume":"128","author":"N Woods","year":"2019","unstructured":"Woods, N., Siponen, M.: Improving password memorability, while not inconveniencing the user. Int. J. Hum. Comput. Stud. 128, 61\u201371 (2019)","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"8","key":"9620_CR25","doi-asserted-by":"publisher","first-page":"1776","DOI":"10.1109\/TIFS.2015.2428671","volume":"10","author":"S Houshmand","year":"2015","unstructured":"Houshmand, S., Aggarwal, S., Flood, R.: Next gen PCFG password cracking. IEEE Trans. Inf. Forensics Secur. 10(8), 1776\u20131791 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9620_CR26","doi-asserted-by":"crossref","unstructured":"Ma, J., Yang, W., Luo, M., Li, N.: A study of probabilistic password models. In: Proceedings of the 2014 IEEE Symposium on Security and Privacy, pp. 689\u2013704 (2014)","DOI":"10.1109\/SP.2014.50"},{"key":"9620_CR27","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.cose.2017.07.012","volume":"73","author":"Y Guo","year":"2018","unstructured":"Guo, Y., Zhang, Z.: LPSE: lightweight password-strength estimation for password meters. Comput. Secur. 73, 507\u2013518 (2018)","journal-title":"Comput. Secur."},{"key":"9620_CR28","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-981-13-5913-2_6","volume-title":"Trusted Computing and Information Security","author":"Y Fang","year":"2019","unstructured":"Fang, Y., Liu, K., Jing, F., Zuo, Z.: Password guessing based on semantic analysis and neural networks. In: Zhang, H., Zhao, B., Yan, F. (eds.) Trusted Computing and Information Security, pp. 84\u201398. Springer, Singapore (2019)"},{"key":"9620_CR29","unstructured":"Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein gan. arXiv preprintarXiv:1701.07875 (2017)"},{"key":"9620_CR30","doi-asserted-by":"crossref","unstructured":"Liu, Y., Xia, Z., Yi, P., Yao, Y., Xie, T., Wang, W., and Zhu, T.: Genpass: a general deep learning model for password guessing with PCFG rules and adversarial generation. In: Proceedings of the 2018 IEEE International Conference on Communications (ICC), pp. 1\u20136 (2018)","DOI":"10.1109\/ICC.2018.8422243"},{"issue":"4","key":"9620_CR31","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1109\/TDSC.2006.53","volume":"3","author":"A Ciaramella","year":"2006","unstructured":"Ciaramella, A., D\u2019Arco, P., De Santis, A., Galdi, C., Tagliaferri, R.: Neural network techniques for proactive password checking. IEEE Trans. Depend. Secure Comput. 3(4), 327\u2013339 (2006)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"3","key":"9620_CR32","first-page":"1","volume":"14","author":"Y He","year":"2020","unstructured":"He, Y., Alem, E.E., Wang, W.: Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites. Front. Comput. Sci. 14(3), 1\u201314 (2020)","journal-title":"Front. Comput. Sci."},{"key":"9620_CR33","doi-asserted-by":"crossref","unstructured":"Junli, C., Licheng, J.: Classification mechanism of support vector machines. In: WCC 2000\u2013ICSP 2000. 2000 5th International Conference on Signal Processing Proceedings. 16th World Computer Congress 2000, vol. 3, pp. 1556\u20131559 (2000)","DOI":"10.1109\/ICOSP.2000.893396"},{"issue":"1","key":"9620_CR34","first-page":"79","volume":"2","author":"KS Jamuna","year":"2009","unstructured":"Jamuna, K.S., Karpagavalli, S., Vijaya, M.S.: A novel approach for password strength analysis through support vector machine. Int. J. Recent Trends Eng. 2(1), 79 (2009)","journal-title":"Int. J. Recent Trends Eng."},{"key":"9620_CR35","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.neucom.2013.07.002","volume":"123","author":"F Zhu","year":"2014","unstructured":"Zhu, F., Ye, N., Wei, Yu., Sheng, X., Li, G.: Boundary detection and sample reduction for one-class support vector machines. Neurocomputing 123, 166\u2013173 (2014)","journal-title":"Neurocomputing"},{"key":"9620_CR36","first-page":"139","volume":"2","author":"LM Manevitz","year":"2001","unstructured":"Manevitz, L.M., Yousef, M.: One-class svms for document classification. J. Mach. Learn. Res. 2, 139\u2013154 (2001)","journal-title":"J. Mach. Learn. Res."}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-021-09620-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-021-09620-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-021-09620-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T02:08:48Z","timestamp":1725934128000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-021-09620-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,17]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["9620"],"URL":"https:\/\/doi.org\/10.1007\/s10922-021-09620-w","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,17]]},"assertion":[{"value":"17 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"13"}}