{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:33:18Z","timestamp":1729647198714,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/infosec.2015.7435522","type":"proceedings-article","created":{"date-parts":[[2016,3,21]],"date-time":"2016-03-21T22:37:31Z","timestamp":1458599851000},"page":"158-164","source":"Crossref","is-referenced-by-count":17,"title":["Dictionary attack on Wordpress: Security and forensic analysis"],"prefix":"10.1109","author":[{"given":"Ar Kar","family":"Kyaw","sequence":"first","affiliation":[]},{"given":"Franco","family":"Sioquim","sequence":"additional","affiliation":[]},{"given":"Justin","family":"Joseph","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Getting the Most Out of Your PHP Log Files: A Practical Guide","year":"2015","author":"sanosyan","key":"ref10"},{"journal-title":"Skullsecurity","article-title":"Passwords","year":"2015","key":"ref11"},{"key":"ref12","article-title":"Password Managers: Attacks and Defenses","author":"silver","year":"2014","journal-title":"Proc 23rd USENIX Secur Symp"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70024-1"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"367","DOI":"10.12988\/ces.2015.5252","article-title":"An Anaysis of CFG Password Against Brute Force Attack for Web Applications","volume":"8","author":"vaithyasubramanian","year":"2015","journal-title":"Contemporary Engineeri"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PCI.2011.6"},{"article-title":"Using probabilistic techniques to aid in password cracking attacks","year":"2010","author":"weir","key":"ref16"},{"key":"ref17","article-title":"Web Application Incident Response & Forensics","author":"willis","year":"2006","journal-title":"Black Hat Briefings USA 2006"},{"journal-title":"Wordpress","article-title":"Debugging in WordPress","year":"2015","key":"ref18"},{"year":"2015","key":"ref4","article-title":"[Infographic] WordPress 4.1 Gets Roughly 1 Million Downloads Every Two Days + Other Mesmerizing WordPress Stats"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060815"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143129"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.38"},{"journal-title":"MySql","article-title":"5.2 MySQL Server Logs","year":"2015","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2015.03.02"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.116"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23357"},{"key":"ref9","first-page":"1","article-title":"An examination of digital forensic models","volume":"1","author":"reith","year":"2002","journal-title":"International Journal of Digital Evidence"}],"event":{"name":"2015 Second International Conference on Information Security and Cyber Forensics (InfoSec)","start":{"date-parts":[[2015,11,15]]},"location":"Cape Town, South Africa","end":{"date-parts":[[2015,11,17]]}},"container-title":["2015 Second International Conference on Information Security and Cyber Forensics (InfoSec)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7431308\/7435496\/07435522.pdf?arnumber=7435522","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T20:35:45Z","timestamp":1567715745000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7435522\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/infosec.2015.7435522","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}