{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T08:01:36Z","timestamp":1764403296598,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,26]]},"DOI":"10.1109\/wincom59760.2023.10323000","type":"proceedings-article","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T19:07:27Z","timestamp":1700680047000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["New Algorithm of Weak Password Detection"],"prefix":"10.1109","author":[{"given":"Adil","family":"Maralbayev","sequence":"first","affiliation":[{"name":"Astana IT University,Department Intelligent Systems and Cybersecurity,Astana,Kazakhstan"}]},{"given":"Gabdu-Samad","family":"Omar","sequence":"additional","affiliation":[{"name":"Astana IT University,Department Intelligent Systems and Cybersecurity,Astana,Kazakhstan"}]},{"given":"Meruyert","family":"Abdulayeva","sequence":"additional","affiliation":[{"name":"Astana IT University,Department Intelligent Systems and Cybersecurity,Astana,Kazakhstan"}]},{"given":"Leila","family":"Rzayeva","sequence":"additional","affiliation":[{"name":"Astana IT University,Department Intelligent Systems and Cybersecurity,Astana,Kazakhstan"}]},{"given":"Gaukhar","family":"Kalybek","sequence":"additional","affiliation":[{"name":"Astana IT University,Department Intelligent Systems and Cybersecurity,Astana,Kazakhstan"}]},{"given":"Erasyl","family":"Rakhym","sequence":"additional","affiliation":[{"name":"Astana IT University,Department Intelligent Systems and Cybersecurity,Astana,Kazakhstan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3008433"},{"key":"ref2","article-title":"A case study of unauthorized login attempts against honeypots via remote desktop","author":"Rehnb\u00e4ck","year":"2023","journal-title":"DIVA"},{"volume-title":"A case study on various network security tools","year":"2019","author":"Acharya","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2020.2992966"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3179701"},{"issue":"1","key":"ref6","first-page":"42","article-title":"A study on how the pandemic changed the cybersecurity landscape","volume":"25","author":"Georgescu","year":"2021","journal-title":"Ideas.Repec.Org"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.3011208"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3833455"},{"article-title":"An Empirical Study of User Authentication: The Perceptions Versus Practice of Strong Passwords","volume-title":"Presented at the International Association for Computer Information Systems (IACIS) Conference","author":"Bain","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683212"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837113"},{"article-title":"Fast, lean, and accurate: Modeling password guessability using neural networks","volume-title":"In Proceedings of the 25th USENIX Security Symposium (USENIX Security 16)","author":"Melicher","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-017-9421-4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2348-5_9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4568368"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/milcom.2018.8599742"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23357"},{"key":"ref18","first-page":"640","article-title":"User choices and regrets: Understanding users\u2019 password decisions","volume-title":"In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","author":"Ur"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"volume-title":"The risk of RDP Brute-Force attacks in UK","year":"2020","key":"ref20"}],"event":{"name":"2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM)","start":{"date-parts":[[2023,10,26]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2023,10,28]]}},"container-title":["2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10322877\/10322879\/10323000.pdf?arnumber=10323000","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T21:47:47Z","timestamp":1709416067000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10323000\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,26]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/wincom59760.2023.10323000","relation":{},"subject":[],"published":{"date-parts":[[2023,10,26]]}}}