{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:20:54Z","timestamp":1759638054622,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/isncc.2018.8531061","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T00:29:25Z","timestamp":1543883365000},"page":"1-5","source":"Crossref","is-referenced-by-count":6,"title":["A password generator tool to increase users' awareness on bad password construction strategies"],"prefix":"10.1109","author":[{"given":"Pieris","family":"Tsokkis","sequence":"first","affiliation":[]},{"given":"Eliana","family":"Stavrou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1002\/acp.1014"},{"year":"0","author":"riley","journal-title":"Password Security What Users Know and What They Actually Do","key":"ref11"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/INFOCOM.2016.7524583"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.14722\/ndss.2014.23357"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/VIZSEC.2009.5375544"},{"key":"ref15","first-page":"387","article-title":"Password cracking based on special keyboard patterns","volume":"8","author":"chou","year":"2012","journal-title":"International Journal of Innovative Computing Information and Control"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.14722\/ndss.2014.23103"},{"key":"ref17","article-title":"Motivating users to choose better passwords through peer pressure","author":"sotirakopoulos","year":"2011","journal-title":"Symposium On Usable Privacy and Security"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/2470654.2481329"},{"key":"ref19","article-title":"Adaptive Password-Strength Meters from Markov Models","author":"castelluccia","year":"2012","journal-title":"19th Annual Network & Distributed System Security Symposium"},{"year":"0","journal-title":"CeWL - Custom Word List generator","key":"ref28"},{"key":"ref4","article-title":"Password Cracking and Countermeasures in Computer Security: A Survey","author":"han","year":"0","journal-title":"Cryptography and Security"},{"year":"0","journal-title":"Wyd password profiling tool","key":"ref27"},{"year":"2015","author":"bada","journal-title":"Cyber Security Awareness Campaigns Why Do They Fail to Change Behaviour?","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/CyberSA.2017.8073385"},{"year":"0","journal-title":"Hashcat Advanced Password Recovery","key":"ref29"},{"key":"ref5","first-page":"247","article-title":"Graphical Passwords Authentication: A Survey","volume":"4","author":"ambade","year":"2015","journal-title":"IJCSMC"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1002\/j.1538-7305.1984.tb00058.x"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/359168.359172"},{"year":"0","journal-title":"ENISA Threat Landscape 2016","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/0167-4048(89)90049-7"},{"year":"2011","author":"evans","journal-title":"The Internet of Things How the next Evolution of the Internet Is Changing Everything","key":"ref1"},{"key":"ref20","article-title":"How does your password measure up? The effect of strength meters on password creation","author":"ur","year":"2012","journal-title":"Proceedings of the 21st USENIX Security Symposium"},{"key":"ref22","article-title":"Improving usability of password management with standardized password policies","author":"thorsheim","year":"2012","journal-title":"7th Conf on Network and Info Systems Security"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2739044"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/PICMET.2016.7806737"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/1978942.1979321"},{"year":"0","journal-title":"Common User Passwords Profiler (CUPP)","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/1866307.1866327"}],"event":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","start":{"date-parts":[[2018,6,19]]},"location":"Rome","end":{"date-parts":[[2018,6,21]]}},"container-title":["2018 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8511028\/8530880\/08531061.pdf?arnumber=8531061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T04:54:18Z","timestamp":1598244858000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8531061\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/isncc.2018.8531061","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}