Warning of Affected Users About an Identity Leak
暂无分享,去创建一个
[1] S. Subrayan,et al. Multi-factor Authentication Scheme for Shadow Attacks in Social Network , 2017, 2017 International Conference on Technical Advancements in Computers and Communications (ICTACC).
[2] Michael Meier,et al. Gathering and analyzing identity leaks for a proactive warning of affected users , 2018, CF.
[3] Gianluca Stringhini,et al. What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild , 2016, Internet Measurement Conference.
[4] Vern Paxson,et al. Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials , 2017, CCS.
[5] Stefan Savage,et al. Tripwire: inferring internet site compromise , 2017, Internet Measurement Conference.
[6] Christoph Meinel,et al. Automated parsing and interpretation of identity leaks , 2016, Conf. Computing Frontiers.
[7] Wenyuan Xu,et al. Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis , 2018, IEEE Transactions on Dependable and Secure Computing.
[8] Christoph Neumann,et al. On the Privacy Impacts of Publicly Leaked Password Databases , 2017, DIMVA.