{"id":"https://openalex.org/W2766015831","doi":"https://doi.org/10.1109/cybersa.2017.8073385","title":"A situation-aware user interface to assess users' ability to construct strong passwords: A conceptual architecture","display_name":"A situation-aware user interface to assess users' ability to construct strong passwords: A conceptual architecture","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2766015831","doi":"https://doi.org/10.1109/cybersa.2017.8073385","mag":"2766015831"},"language":"en","primary_location":{"id":"doi:10.1109/cybersa.2017.8073385","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2017.8073385","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032212838","display_name":"Eliana Stavrou","orcid":"https://orcid.org/0000-0003-4040-4942"},"institutions":[{"id":"https://openalex.org/I4210108889","display_name":"University of Central Lancashire Cyprus","ror":"https://ror.org/020ps3a34","country_code":"CY","type":"education","lineage":["https://openalex.org/I185852735","https://openalex.org/I4210108889"]}],"countries":["CY"],"is_corresponding":true,"raw_author_name":"Eliana Stavrou","raw_affiliation_strings":["Computing department, University of Central Lancashire, Nicosia, Cyprus"],"affiliations":[{"raw_affiliation_string":"Computing department, University of Central Lancashire, Nicosia, Cyprus","institution_ids":["https://openalex.org/I4210108889"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5032212838"],"corresponding_institution_ids":["https://openalex.org/I4210108889"],"apc_list":null,"apc_paid":null,"fwci":2.4181,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.9156426,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"18","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9156000018119812,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.8038298487663269},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7380885481834412},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7163496017456055},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.6436852216720581},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.5516937971115112},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.5250691771507263},{"id":"https://openalex.org/keywords/user-interface","display_name":"User interface","score":0.4991939067840576},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2722899615764618},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15660718083381653},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14280423521995544}],"concepts":[{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.8038298487663269},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7380885481834412},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7163496017456055},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.6436852216720581},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.5516937971115112},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.5250691771507263},{"id":"https://openalex.org/C89505385","wikidata":"https://www.wikidata.org/wiki/Q47146","display_name":"User interface","level":2,"score":0.4991939067840576},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2722899615764618},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15660718083381653},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14280423521995544},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cybersa.2017.8073385","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2017.8073385","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W12010980","https://openalex.org/W1487941708","https://openalex.org/W1526870393","https://openalex.org/W1571454820","https://openalex.org/W2034583168","https://openalex.org/W2073342447","https://openalex.org/W2097267243","https://openalex.org/W2107557415","https://openalex.org/W2110252336","https://openalex.org/W2113266120","https://openalex.org/W2949643954","https://openalex.org/W4299928509","https://openalex.org/W6600492844"],"related_works":["https://openalex.org/W2154641962","https://openalex.org/W3041171771","https://openalex.org/W1967474012","https://openalex.org/W2247218287","https://openalex.org/W2100557470","https://openalex.org/W2117543524","https://openalex.org/W1482941161","https://openalex.org/W2378548130","https://openalex.org/W830599432","https://openalex.org/W2366067337"],"abstract_inverted_index":{"Text-based":[0],"passwords":[1,45,132],"are":[2,26,83],"still":[3],"one":[4],"of":[5,16,49,71,97,138,161,191,211,241,296],"the":[6,11,35,47,60,69,79,98,114,117,136,159,212,239,243,288,293,297],"main":[7,39,294],"techniques":[8],"to":[9,28,43,63,130,148,157,167,175,201,208,258,266,270,286],"authenticate":[10],"users.":[12],"Although":[13],"a":[14,54,65,88,169,188,255,262,272],"variety":[15],"measures":[17],"(e.g.":[18],"awareness":[19,50,245],"activities,":[20],"password-strength":[21],"checkers,":[22],"password-composition":[23],"policies,":[24],"etc.)":[25],"taken":[27],"prevent":[29],"users":[30,104,153,216],"from":[31],"selecting":[32,87],"weak":[33,44,131],"passwords,":[34],"problem":[36],"remains.":[37],"A":[38,164],"factor":[40],"that":[41,82,100,215,274],"leads":[42],"is":[46,172,206,221,275],"lack":[48],"on":[51,113,193],"what":[52],"constitutes":[53],"strong":[55,66],"password.":[56,89],"Organizations":[57],"should":[58,143],"assess":[59,168,267],"users'":[61,80,244,268],"ability":[62,269],"construct":[64,271],"password":[67,109,125,179,195,249,273],"through":[68],"assessment":[70],"their":[72,103,152,229],"password's":[73,170],"strength,":[74],"and":[75,199,228,291],"taking":[76],"into":[77],"consideration":[78],"practices":[81,127,147,214],"typically":[84,217],"applied":[85],"when":[86],"In":[90],"this":[91],"way,":[92],"organizations":[93,142],"can":[94,121,128,134],"be":[95,122,149,202,209],"aware":[96,210],"situation,":[99],"is,":[101],"if":[102],"follow":[105],"good":[106,146],"or":[107],"bad":[108,213,248],"construction":[110,126,250],"practices.":[111,251],"Depending":[112],"practice":[115],"utilized,":[116],"organization's":[118],"security":[119],"level":[120,246],"affected.":[123],"Bad":[124],"lead":[129],"which":[133],"increase":[135],"risk":[137],"unauthorized":[139,162],"access.":[140,163],"Therefore,":[141],"target":[144],"for":[145],"utilized":[150],"by":[151,173],"in":[154,260],"an":[155],"effort":[156],"decrease":[158],"possibility":[160],"typical":[165],"way":[166],"strength":[171],"trying":[174],"crack":[176],"it":[177,205],"using":[178],"cracking":[180,196],"tools.":[181],"An":[182,279],"assessor,":[183],"e.g.":[184],"system":[185],"administrator,":[186],"requires":[187],"fair":[189],"amount":[190],"knowledge":[192,220],"how":[194],"tools":[197,227],"operate":[198],"need":[200],"configured.":[203],"Also,":[204],"essential":[207],"utilize.":[218],"Such":[219],"not":[222,235,276],"always":[223],"present.":[224],"Furthermore,":[225],"these":[226],"respective":[230],"graphical":[231],"user":[232,264,298],"interface,":[233],"have":[234],"been":[236,284],"designed":[237],"with":[238],"objective":[240],"assessing":[242],"against":[247],"This":[252],"paper":[253],"proposes":[254],"conceptual":[256],"architecture":[257,290],"assist":[259],"designing":[261],"situation-aware":[263],"interface":[265],"easily":[277],"crackable.":[278],"initial":[280],"mock":[281],"prototype":[282],"has":[283],"developed":[285],"realize":[287],"proposed":[289],"identify":[292],"features":[295],"interface.":[299]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
