{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:48:30Z","timestamp":1764841710664,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T00:00:00Z","timestamp":1350259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,15]]},"DOI":"10.1145\/2379690.2379702","type":"proceedings-article","created":{"date-parts":[[2012,10,4]],"date-time":"2012-10-04T20:18:52Z","timestamp":1349381932000},"page":"88-95","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Visualizing semantics in passwords"],"prefix":"10.1145","author":[{"given":"Rafael","family":"Veras","sequence":"first","affiliation":[{"name":"University of Ontario, Oshawa, Canada"}]},{"given":"Julie","family":"Thorpe","sequence":"additional","affiliation":[{"name":"University of Ontario, Oshawa, Canada"}]},{"given":"Christopher","family":"Collins","sequence":"additional","affiliation":[{"name":"University of Ontario, Oshawa, Canada"}]}],"member":"320","published-online":{"date-parts":[[2012,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2007.01.030"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2007.70415"},{"key":"e_1_3_2_1_3_1","first-page":"15","volume-title":"Visualization of Time-Oriented Data","author":"Aigner W.","year":"1997","unstructured":"W. Aigner , S. Miksch , H. Schumann , and C. Tominski . Visualization of Time-Oriented Data , chapter 7, pages 15 -- 44 . Number 1997 in Human-Computer Interaction Series. Springer London , 2011. W. Aigner, S. Miksch, H. Schumann, and C. Tominski. Visualization of Time-Oriented Data, chapter 7, pages 15--44. Number 1997 in Human-Computer Interaction Series. Springer London, 2011."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_3"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.185"},{"key":"e_1_3_2_1_7_1","volume-title":"URL http:\/\/colorbrewer2.org\/. Last accessed","author":"Brewer C. A.","year":"2012","unstructured":"C. A. Brewer . Colorbrewer. URL http:\/\/colorbrewer2.org\/. Last accessed July 09, 2012 . C. A. Brewer. Colorbrewer. URL http:\/\/colorbrewer2.org\/. Last accessed July 09, 2012."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/288392.288399"},{"key":"e_1_3_2_1_9_1","volume-title":"Google password strength api. URL http:\/\/www.codeproject.com\/Articles\/19245\/Google-Password-Strength-API. Last accessed","author":"Chapman R.","year":"2012","unstructured":"R. Chapman . Google password strength api. URL http:\/\/www.codeproject.com\/Articles\/19245\/Google-Password-Strength-API. Last accessed June 24, 2012 . R. Chapman. Google password strength api. URL http:\/\/www.codeproject.com\/Articles\/19245\/Google-Password-Strength-API. Last accessed June 24, 2012."},{"key":"e_1_3_2_1_10_1","volume-title":"Security Data Visualization:Graphical Techniques for Network Analysis","author":"Conti G.","year":"2007","unstructured":"G. Conti . Security Data Visualization:Graphical Techniques for Network Analysis . No Starch Press, 2007 . G. Conti. Security Data Visualization:Graphical Techniques for Network Analysis. No Starch Press, 2007."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2008.175"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.150"},{"key":"e_1_3_2_1_14_1","first-page":"807","volume-title":"Proc. of the 22nd Annual SAS User Group Int. Conf.","author":"Mintz F.-S. T.","year":"1997","unstructured":"F.-S. T. Mintz , D. and M. Wayland . Tracking air quality trends with sas\/graph . In Proc. of the 22nd Annual SAS User Group Int. Conf. , pages 807 -- 812 , 1997 . F.-S. T. Mintz, D. and M. Wayland. Tracking air quality trends with sas\/graph. In Proc. of the 22nd Annual SAS User Group Int. Conf., pages 807--812, 1997."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1057\/ivs.2010.12"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/882511.885379"},{"key":"e_1_3_2_1_17_1","unstructured":"SkullSecurity.org. Leaked passwords. http:\/\/www.skullsecurity.org\/wiki\/index.php\/Passwords Last accessed June 27 2012.  SkullSecurity.org. Leaked passwords. http:\/\/www.skullsecurity.org\/wiki\/index.php\/Passwords Last accessed June 27 2012."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357217"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of the Annual SIGRAD Conf.","author":"Tominski C.","year":"1999","unstructured":"C. Tominski . Enhanced interactive spiral display . In Proc. of the Annual SIGRAD Conf. , Special Theme: Interactivity, pages 53--56 , 1999 . C. Tominski. Enhanced interactive spiral display. In Proc. of the Annual SIGRAD Conf., Special Theme: Interactivity, pages 53--56, 1999."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2009.171"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866327"},{"key":"e_1_3_2_1_22_1","volume-title":"ASA Statistical Computing and Graphics Data Expo 2009","author":"Wicklin R.","year":"2009","unstructured":"R. Wicklin and R. Allison . Congestion in the sky: Visualising domestic airline traffic with sas . ASA Statistical Computing and Graphics Data Expo 2009 , 2009 . R. Wicklin and R. Allison. Congestion in the sky: Visualising domestic airline traffic with sas. ASA Statistical Computing and Graphics Data Expo 2009, 2009."}],"event":{"name":"VizSec '12: 2012 Symposium on Visualization for Cyber Security","acronym":"VizSec '12","location":"Seattle Washington USA"},"container-title":["Proceedings of the Ninth International Symposium on Visualization for Cyber Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2379690.2379702","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2379690.2379702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:33:57Z","timestamp":1750239237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2379690.2379702"}},"subtitle":["the role of dates"],"short-title":[],"issued":{"date-parts":[[2012,10,15]]},"references-count":22,"alternative-id":["10.1145\/2379690.2379702","10.1145\/2379690"],"URL":"https:\/\/doi.org\/10.1145\/2379690.2379702","relation":{},"subject":[],"published":{"date-parts":[[2012,10,15]]},"assertion":[{"value":"2012-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}