References
- 1. Mukthineni, V., R. Mukthineni, O. Sharma, S. J. Narayanan. Face Authenticated Hand Gesture Based Human Computer Interaction for Desktops. – Cybernernetics and Information Technologies., Vol. 20, 2020, No 4, pp. 74-89.10.2478/cait-2020-0048
- 2. M. Lehto, P. Neittaanmäki, Eds. Cyber Security: Analytics, Technology and Automation. – Cham, Springer International Publishing, Vol. 78. 2015.10.1007/978-3-319-18302-2
- 3. Genç, Z. A., S. Kardaş, M. S. Kiraz. Examination of a New Defense Mechanism: Honeywords. – In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). G. P. Hancke, E. Damiani, Eds. Cham, Springer International Publishing. Vol. 10741. 2018, pp. 130-139.
- 4. Kusuma, A. B., Y. R. Pramadi. Implementation of Honeywords as a Codeigniter Library for a Solution to Password-Cracking Detection. – IOP Conf. Ser. Mater. Sci. Eng., Vol. 508, May 2019, No 1, p. 012134. DOI: 10.1088/1757-899X/508/1/012134.10.1088/1757-899X/508/1/012134
- 5. Win, T., K. S. M. Moe. Protecting Private Data Using Improved Honey Encryption and Honeywords Generation Algorithm. – Adv. Sci. Technol. Eng. Syst., Vol. 3, 2018, No 5, pp. 311-320. DOI: 10.25046/aj030537.10.25046/aj030537
- 6. Chakraborty, N., S. Mondal. Towards Improving Storage Cost and Security Features of Honeyword Based Approaches. – Procedia Comput. Sci., Vol. 93, 2016, No September, pp. 799-807. DOI: 10.1016/j.procs.2016.07.298.10.1016/j.procs.2016.07.298
- 7. Wang, R., H. Chen, J. Sun. Phoney: Protecting Password Hashes with Threshold Cryptology and Honeywords. – Int. J. Embed. Syst., Vol. 8, 2016, No 2-3, pp. 146-154. DOI: 10.1504/IJES.2016.076108.10.1504/IJES.2016.076108
- 8. Palaniappan, S., V. Parthipan, S. Stewart Kirubakaran, R. Johnson. Secure User Authentication Using Honeywords. – Lecture Notes on Data Engineering and Communications Technologies, Vol. 31, 2020, pp. 896-903.10.1007/978-3-030-24643-3_105
- 9. Homayouni, S. M., D. B. M. M. Fontes. Metaheuristic Algorithms – Metaheuristics for Maritime Operations. Hoboken, NJ, USA, John Wiley & Sons, Inc., 2018, pp. 21-38.10.1002/9781119483151.ch2
- 10. Tezel, B. T., A. Mert. A Cooperative System for Metaheuristic Algorithms. – Expert Syst. Appl., Vol. 165, 2021, No May 2020, p. 113976. DOI: 10.1016/j.eswa.2020.113976.10.1016/j.eswa.2020.113976
- 11. Toshev, A. Particle Swarm Optimization and Tabu Search Hybrid Algorithm for Flexible Job Shop Scheduling Problem – Analysis of Test Results. – Cybernernetics and Information Technologies, Vol. 19, 2019, No 4, pp. 26-44.10.2478/cait-2019-0034
- 12. Kumar, A., D. Kumar, S. K. Jarial. A Review on Artificial Bee Colony Algorithms and Their Applications to Data Clustering. – Cybernernetics and Information Technologies, Vol. 17, 2017, No 3, pp. 3-28.10.1515/cait-2017-0027
- 13. Green, D., A. Aleti, J. Garcia. The Nature of Nature: Why Nature-Inspired Algorithms Work. – Model. Optim. Sci. Technol., Vol. 10, 2017, pp. 1-27. DOI: 10.1007/978-3-319-50920-4_1.10.1007/978-3-319-50920-4_1
- 14. Al-Obaidi, A. T. S., H. S. Abdullah, Z. O. Ahmed. Meerkat Clan Algorithm: A New Swarm Intelligence Algorithm. – Indonesian Journal of Electrical Engineering and Computer Science, Vol. 10, 2018, No 1. pp. 354-360. DOI: 10.11591/ijeecs.v10.i1.10.11591/ijeecs.v10.i1
- 15. Abd Alradha Alsaidi, S. A., D. K. Muhsen, S. M. Ali. Improved Scatter Search Algorithm Based on Meerkat Clan Algorithm to Solve NP-Hard Problems. – Period. Eng. Nat. Sci., Vol. 8, 2020, No 3. DOI: 10.21533/pen.v8i3.1563.
- 16. Jameel, N., H. S. Abdullah. A Proposed Intelligent Features Selection Method Using Meerkat Clan Algorithm. – J. Phys. Conf. Ser., Vol. 1804, February 2021, No 1, p. 012061. DOI: 10.1088/1742-6596/1804/1/012061.10.1088/1742-6596/1804/1/012061
- 17. Juels, A., R. L. Rivest. Honeywords: Making Password-Cracking Detectable. – In: Proc. of 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS’13), 2013, No October 2015, pp. 145-160. DOI: 10.1145/2508859.2516671.10.1145/2508859.2516671
- 18. Erguler, I. Achieving Flatness: Selecting the Honeywords from Existing User Passwords. – IEEE Trans. Dependable Secur. Comput., Vol. 13, March 2015, No 2, pp. 284-295. DOI: 10.1109/TDSC.2015.2406707.10.1109/TDSC.2015.2406707
- 19. Chakraborty, N., S. Mondal. On Designing a Modified-UI Based Honeyword Generation Approach for Overcoming the Existing Limitations. – Comput. Secur., Vol. 66, 2017, pp. 155-168. DOI: 10.1016/j.cose.2017.01.011.10.1016/j.cose.2017.01.011
- 20. Akshima, A., D. Chang, A. Goel, S. Mishra, S. K. Sanadhya. Generation of Secure and Reliable Honeywords, Preventing False Detection. – IEEE Trans. Dependable Secur. Comput., Vol. 5971, 2018, No c, pp. 1-13. DOI: 10.1109/TDSC.2018.2824323.10.1109/TDSC.2018.2824323
- 21. Akif, O. Z., A. F. Sabeeh, G. J. Rodgers, H. S. Al-Raweshidy. Achieving Flatness: Honeywords Generation Method for Passwords Based on User Behaviours. – Int. J. Adv. Comput. Sci. Appl., Vol. 10, 2019, No 3, pp. 28-37. DOI: 10.14569/IJACSA.2019.0100305.10.14569/IJACSA.2019.0100305
- 22. Brindtha, J., K. R. Hithaeishini, R. Komala, G. Abirami, U. Arul. Identification and Detecting of Attacker in a Purchase Portal Using Honeywords. – In: Proc. of 3rd IEEE Int. Conf. Sci. Technol. Eng. Manag. (ICONSTEM’17), Vol. 2018-Janua, 2017, pp. 389-393. DOI: 10.1109/ICONSTEM.2017.8261414.10.1109/ICONSTEM.2017.8261414
- 23. Genç, Z. A., G. Lenzini, P. Y. A. Ryan, I. Vazquez Sandoval. A Critical Security Analysis of the Password-Based Authentication Honeywords System under Code-Corruption Attack. – Communications in Computer and Information Science, Vol. 977, 2019, pp. 125-151.10.1007/978-3-030-25109-3_7
- 24. Genç, Z. A., G. Lenzini, P. Y. A. Ryan, I. V. Sandoval. A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. – In: Proc. of 4th International Conference on Information Systems Security and Privacy, Vol. 2018-Janua, 2018, No Icissp, pp. 83-95. DOI: 10.5220/0006609100830095.10.5220/0006609100830095
- 25. Catuogno, L., A. Castiglione, F. Palmieri. A Honeypot System with Honeyword-Driven Fake Interactive Sessions. – In: Proc. of 2015 Int. Conf. High Perform. Comput. Simulation (HPCS’15), 2015, pp. 187-194. DOI: 10.1109/HPCSim.2015.7237039.10.1109/HPCSim.2015.7237039
- 26. Nathezhtha, T., V. Vaidehi. Honeyword with Salt-Chlorine Generator to Enhance Security of Cloud User Credentials. – Commun. Comput. Inf. Sci., Vol. 746, 2017, pp. 159-169. DOI: 10.1007/978-981-10-6898-0_13.10.1007/978-981-10-6898-0_13
- 27. Moe, K. S. M., T. Win. Improved Hashing and Honey-Based Stronger Password Prevention against Brute Force Attack. – In: 2017 International Symposium on Electronics and Smart Devices (ISESD’17), Vol. 2018-Janua, October 2017, pp. 1-5. DOI: 10.1109/ISESD.2017.8253295.10.1109/ISESD.2017.8253295
