{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T14:38:44Z","timestamp":1762007924880,"version":"build-2065373602"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/eit.2018.8500257","type":"proceedings-article","created":{"date-parts":[[2018,11,15]],"date-time":"2018-11-15T23:48:00Z","timestamp":1542325680000},"page":"0387-0391","source":"Crossref","is-referenced-by-count":12,"title":["A Real-World Password Cracking Demonstration Using Open Source Tools for Instructional Use"],"prefix":"10.1109","author":[{"given":"Tejaswi","family":"Kakarla","sequence":"first","affiliation":[]},{"given":"Aakif","family":"Mairaj","sequence":"additional","affiliation":[]},{"given":"Ahmad Y.","family":"Javaid","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Password Cracking Using Cain & Abel","year":"2013","author":"mohamed","key":"ref10"},{"journal-title":"Network Security Tools Writing Hacking and Modifying Security Tools","year":"0","author":"dhanjani","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.52"},{"key":"ref13","article-title":"Strengthening passwords","author":"abadi","year":"1997","journal-title":"Digital Systems Research Center"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(96)00003-X"},{"journal-title":"The State of Modern Password Cracking by","year":"0","author":"camejo","key":"ref15"},{"journal-title":"Modern Password Cracking A hands-on approach to creating an optimised and versatile attack","year":"2013","author":"yiannis","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.484"},{"journal-title":"For information","year":"0","key":"ref6"},{"journal-title":"Blog","year":"0","key":"ref5"},{"journal-title":"fossBytes","year":"0","key":"ref8"},{"journal-title":"Webroot","year":"0","key":"ref7"},{"journal-title":"Password Cracking Sam Martin and Mark Tokutomi at","year":"0","key":"ref2"},{"journal-title":"Software crackers","year":"0","author":"degro","key":"ref1"},{"journal-title":"Robert svenson &#x2013; From hacking to report writing","year":"0","key":"ref9"}],"event":{"name":"2018 IEEE International Conference on Electro\/Information Technology (EIT)","start":{"date-parts":[[2018,5,3]]},"location":"Rochester, MI","end":{"date-parts":[[2018,5,5]]}},"container-title":["2018 IEEE International Conference on Electro\/Information Technology (EIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8482102\/8500077\/08500257.pdf?arnumber=8500257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:23:23Z","timestamp":1598228603000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8500257\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/eit.2018.8500257","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}