{"id":"https://openalex.org/W2903474639","doi":"https://doi.org/10.1109/cybersa.2018.8551404","title":"Enhancing Cyber Situational Awareness: A New Perspective of Password Auditing Tools","display_name":"Enhancing Cyber Situational Awareness: A New Perspective of Password Auditing Tools","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2903474639","doi":"https://doi.org/10.1109/cybersa.2018.8551404","mag":"2903474639"},"language":"en","primary_location":{"id":"doi:10.1109/cybersa.2018.8551404","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2018.8551404","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032212838","display_name":"Eliana Stavrou","orcid":"https://orcid.org/0000-0003-4040-4942"},"institutions":[{"id":"https://openalex.org/I4210108889","display_name":"University of Central Lancashire Cyprus","ror":"https://ror.org/020ps3a34","country_code":"CY","type":"education","lineage":["https://openalex.org/I185852735","https://openalex.org/I4210108889"]}],"countries":["CY"],"is_corresponding":true,"raw_author_name":"Eliana Stavrou","raw_affiliation_strings":["Computing Department, Applied Cyber, Security Research Laboratory, University of Central Lancashire Cyprus, Larnaca, Cyprus"],"affiliations":[{"raw_affiliation_string":"Computing Department, Applied Cyber, Security Research Laboratory, University of Central Lancashire Cyprus, Larnaca, Cyprus","institution_ids":["https://openalex.org/I4210108889"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5032212838"],"corresponding_institution_ids":["https://openalex.org/I4210108889"],"apc_list":null,"apc_paid":null,"fwci":0.8223,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.82490747,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9573000073432922,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.8784590363502502},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7373042702674866},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.7137650847434998},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6699249744415283},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.6034150123596191},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.5535710453987122},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.43031567335128784},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.4213946461677551},{"id":"https://openalex.org/keywords/information-security-audit","display_name":"Information security audit","score":0.41864702105522156},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.37824106216430664},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.26063013076782227},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.15322420001029968},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.09283989667892456},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.08702170848846436},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.053254276514053345}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.8784590363502502},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7373042702674866},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.7137650847434998},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6699249744415283},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.6034150123596191},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.5535710453987122},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.43031567335128784},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.4213946461677551},{"id":"https://openalex.org/C39358052","wikidata":"https://www.wikidata.org/wiki/Q2578632","display_name":"Information security audit","level":5,"score":0.41864702105522156},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.37824106216430664},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.26063013076782227},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.15322420001029968},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.09283989667892456},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.08702170848846436},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.053254276514053345}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cybersa.2018.8551404","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2018.8551404","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"},{"id":"pmh:oai:clok.uclan.ac.uk:22805","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402361","display_name":"CLOK (University of Central Lancashire)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I185852735","host_organization_name":"University of Lancashire","host_organization_lineage":["https://openalex.org/I185852735"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1526870393","https://openalex.org/W2346878720","https://openalex.org/W2766015831"],"related_works":["https://openalex.org/W1982158666","https://openalex.org/W2969720675","https://openalex.org/W3131491961","https://openalex.org/W2596766976","https://openalex.org/W2017283799","https://openalex.org/W2953105088","https://openalex.org/W2596869006","https://openalex.org/W137322897","https://openalex.org/W2203557291","https://openalex.org/W72859687"],"abstract_inverted_index":{"Password":[0,44],"auditing":[1,61,99,158,171],"can":[2,29],"enhance":[3],"the":[4,17,40,67,89,92,117,129,133,149,165],"cyber":[5,11],"situational":[6],"awareness":[7],"of":[8,19,42,119,135,167],"defenders,":[9],"e.g.":[10],"security/IT":[12],"professionals,":[13],"with":[14],"regards":[15],"to":[16,52,71,74,87,95,101,104,115,143,163],"strength":[18],"text-based":[20],"authentication":[21],"mechanisms":[22],"utilized":[23],"in":[24,36,108],"an":[25,37,109],"organization.":[26],"Auditing":[27],"results":[28],"proactively":[30],"indicate":[31],"if":[32],"weak":[33],"passwords":[34],"exist":[35],"organization,":[38],"decreasing":[39],"risks":[41],"compromisation.":[43],"cracking":[45,68,80],"is":[46],"a":[47,63,122,168],"typical":[48],"and":[49,111,160],"time-consuming":[50],"way":[51],"perform":[53,59],"password":[54,60,79,98,120,136,157,170],"auditing.":[55],"Given":[56],"that":[57,151],"defenders":[58,103],"within":[62],"specific":[64],"evaluation":[65],"timeframe,":[66],"process":[69],"needs":[70],"be":[72,126,153],"optimized":[73],"yield":[75],"useful":[76],"results.":[77],"Existing":[78],"tools":[81],"do":[82],"not":[83],"provide":[84],"holistic":[85],"features":[86],"optimize":[88],"process.":[90],"Therefore,":[91],"need":[93],"arises":[94],"build":[96],"new":[97],"toolkits":[100,159],"assist":[102],"achieve":[105],"their":[106],"task":[107],"effective":[110],"efficient":[112],"way.":[113],"Moreover,":[114],"maximize":[116],"benefits":[118],"auditing,":[121],"security":[123,137],"policy":[124],"should":[125,152],"utilized.":[127],"Currently":[128],"efforts":[130],"focus":[131],"on":[132,141],"specification":[134,166],"policies,":[138],"providing":[139],"rules":[140],"how":[142],"construct":[144],"passwords.":[145],"This":[146],"work":[147],"proposes":[148],"functionality":[150],"supported":[154],"by":[155],"next-generation":[156],"provides":[161],"guidelines":[162],"drive":[164],"relevant":[169],"policy.":[172]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
