{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:08:23Z","timestamp":1743066503545,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319112022"},{"type":"electronic","value":"9783319112039"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11203-9_6","type":"book-chapter","created":{"date-parts":[[2014,8,14]],"date-time":"2014-08-14T16:36:46Z","timestamp":1408034206000},"page":"94-111","source":"Crossref","is-referenced-by-count":1,"title":["Local Password Validation Using Self-Organizing Maps"],"prefix":"10.1007","author":[{"given":"Diogo","family":"M\u00f3nica","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Ribeiro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/11961635_3","volume-title":"Information Systems Security","author":"L.S.. Clair","year":"2006","unstructured":"Clair, L.S., Johansen, L., Enck, W., Pirretti, M., Traynor, P., McDaniel, P., Jaeger, T.: Password exhaustion: Predicting the end of password usefulness. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol.\u00a04332, pp. 37\u201355. Springer, Heidelberg (2006)"},{"key":"6_CR2","unstructured":"Castelluccia, C., Durmuth, M., Perito, D.: Adaptive password-strength meters from markov models. In: NDSS. The Internet Society (2012)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Spafford, E.H.: Opus: Preventing weak password choices. Computers & Security (1992)","DOI":"10.1016\/0167-4048(92)90207-8"},{"key":"6_CR4","unstructured":"Schechter, S., Herley, C., Mitzenmacher, M.: Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks. In: Proceedings of the 5th USENIX Conference on Hot Topics in Security, HotSec 2010. USENIX Association, Berkeley (2010)"},{"key":"6_CR5","unstructured":"Hashcat password recovery tool (2013), \n                  \n                    http:\/\/hashcat.net\/hashcat\/"},{"key":"6_CR6","volume-title":"Neural Networks: A Comprehensive Foundation","author":"S. Haykin","year":"1998","unstructured":"Haykin, S.: Neural Networks: A Comprehensive Foundation, 2nd edn. Prentice Hall PTR, Upper Saddle River (1998)","edition":"2"},{"key":"6_CR7","volume-title":"Neurocomputing: Foundations of research","author":"T. Kohonen","year":"1988","unstructured":"Kohonen, T.: Neurocomputing: Foundations of research. MIT Press, Cambridge (1988)"},{"key":"6_CR8","unstructured":"Boriah, S., Chandola, V., Kumar, V.: Similarity measures for categorical data: A comparative evaluation. In: Proceedings of the Eighth SIAM International Conference on Data Mining"},{"key":"6_CR9","unstructured":"Huang, Z.: Extensions to the k-means algorithm for clustering large data sets with categorical values (1998)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Indyk, P., Motwani, R.: Approximate nearest neighbors: Towards removing the curse of dimensionality. In: Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, STOC 1998. ACM, New York (1998)","DOI":"10.1145\/276698.276876"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"He, K., Wen, F., Sun, J.: K-means hashing: An affinity-preserving quantization method for learning binary compact codes. In: Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition. IEEE Computer Society, Washington, DC (2013)","DOI":"10.1109\/CVPR.2013.378"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Boufounos, P., Rane, S.: Secure binary embeddings for privacy preserving nearest neighbors. In: Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, WIFS 2011. IEEE Computer Society, Washington, DC (2011)","DOI":"10.1109\/WIFS.2011.6123149"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Datar, M., Immorlica, N., Indyk, P., Mirrokni, V.S.: Locality-sensitive hashing scheme based on p-stable distributions. In: Proceedings of the Twentieth Annual Symposium on Computational Geometry, SCG 2004. ACM, New York (2004)","DOI":"10.1145\/997817.997857"},{"key":"6_CR14","unstructured":"Rockyou list of leaked passwords (2013), \n                  \n                    https:\/\/wiki.skullsecurity.org\/Passwords"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Cormode, G., Muthukrishnan, S.: An improved data stream summary: The count-min sketch and its applications. J. Algorithms (April 2005)","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"6_CR16","unstructured":"Kohonen, T.: Fast evolutionary learning with batch-type self-organizing maps. Neural Process (April 1999)"},{"key":"6_CR17","unstructured":"Fort, J.C., Letremy, P., Cottrell, M.: Advantages and drawbacks of the batch kohonen algorithm. In: Verleysen, M. (ed.) ESANN (2002)"},{"key":"6_CR18","unstructured":"John the ripper password cracking tool, \n                  \n                    http:\/\/www.openwall.com\/john\/"},{"key":"6_CR19","unstructured":"Openwall wordlist collection, \n                  \n                    http:\/\/www.openwall.com\/wordlists\/"}],"container-title":["Lecture Notes in Computer Science","Computer Security - ESORICS 2014"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11203-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,22]],"date-time":"2019-09-22T20:06:09Z","timestamp":1569182769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11203-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319112022","9783319112039"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11203-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}