Who Is Reusing Stolen Passwords? An Empirical Study on Stolen Passwords and Countermeasures.
Chedy MissaouiSafa BachouchIbrahim AbdelkaderSlim TrabelsiPublished in: CSS (2018)
Keyphrases
- countermeasures
- information security
- user authentication
- information systems
- intrusion detection
- security issues
- rural areas
- power analysis
- computer security
- network security
- smart card
- smart grid
- cyber attacks
- private information
- critical infrastructure
- traffic accidents
- learning objects
- java card
- information technology
- metadata