Automating the Bypass of Image-based CAPTCHA and Assessing Security.
Krish SukhaniSahil SawantSarthak ManiarRenuka PawarPublished in: ICCCNT (2021)
Keyphrases
- user authentication
- information security
- intrusion detection
- database
- functional requirements
- network security
- security issues
- information assurance
- security vulnerabilities
- security systems
- cyber security
- sensitive data
- security requirements
- access control
- computer vision
- neural network
- network management
- countermeasures
- web services
- computer security
- security protocols
- security model
- learning algorithm
- cyber attacks
- security threats
- data sets
- real time