{"id":"https://openalex.org/W7108205625","doi":"https://doi.org/10.1109/tdsc.2025.3639170","title":"The Impact of Digit Semantic Patterns on Password Security","display_name":"The Impact of Digit Semantic Patterns on Password Security","publication_year":2025,"publication_date":"2025-12-01","ids":{"openalex":"https://openalex.org/W7108205625","doi":"https://doi.org/10.1109/tdsc.2025.3639170"},"language":null,"primary_location":{"id":"doi:10.1109/tdsc.2025.3639170","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3639170","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Daojing He","orcid":"https://orcid.org/0000-0002-3820-8128"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Daojing He","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Zhiyong Liu","orcid":"https://orcid.org/0009-0007-2110-2267"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiyong Liu","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Beibei Zhou","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Beibei Zhou","raw_affiliation_strings":["School of Artificial Intelligence Application, Shanghai Urban Construction Vocational College, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence Application, Shanghai Urban Construction Vocational College, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Sammy Chan","orcid":"https://orcid.org/0000-0002-8524-229X"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Sammy Chan","raw_affiliation_strings":["Department of Electrical Engineering, City University of Hong Kong, Kowloon, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, City University of Hong Kong, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":null,"display_name":"Kim-Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cybersecurity, University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cybersecurity, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.70572012,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"2","first_page":"3652","last_page":"3666"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.0020000000949949026,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.0010000000474974513,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.9104999899864197},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.5471000075340271},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.4165000021457672},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.39010000228881836},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.34599998593330383},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.3434999883174896}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.9104999899864197},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8359000086784363},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.5471000075340271},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5134999752044678},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.4165000021457672},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.39010000228881836},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.34599998593330383},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.3434999883174896},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.3278000056743622},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.28529998660087585},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.2766000032424927},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.26660001277923584},{"id":"https://openalex.org/C6881194","wikidata":"https://www.wikidata.org/wiki/Q7449091","display_name":"Semantic technology","level":4,"score":0.2644999921321869}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3639170","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3639170","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W2104927807","https://openalex.org/W2135359429","https://openalex.org/W2346878720","https://openalex.org/W2394619600","https://openalex.org/W2598853221","https://openalex.org/W2616051826","https://openalex.org/W2756720050","https://openalex.org/W2911254135","https://openalex.org/W2963532563","https://openalex.org/W3041103708","https://openalex.org/W3120591290","https://openalex.org/W3154781724","https://openalex.org/W3158562336","https://openalex.org/W4200228858","https://openalex.org/W4205466424","https://openalex.org/W4285197934","https://openalex.org/W4285231999","https://openalex.org/W4285266886","https://openalex.org/W4293168393","https://openalex.org/W4298012343","https://openalex.org/W4391929653","https://openalex.org/W4391972873","https://openalex.org/W4392666399","https://openalex.org/W4393253184","https://openalex.org/W4399206179","https://openalex.org/W4402263804","https://openalex.org/W4403356924","https://openalex.org/W4405786493","https://openalex.org/W4406727820","https://openalex.org/W4407278761","https://openalex.org/W4407316181","https://openalex.org/W4407360700","https://openalex.org/W4407389004","https://openalex.org/W4411337338"],"related_works":[],"abstract_inverted_index":{"Continuously":[0],"preventing":[1],"weak":[2],"password":[3,34,137],"attacks":[4],"is":[5],"one":[6],"of":[7,44,75,115,125,149],"the":[8,42,72,96,112,123,136,145],"most":[9],"important":[10,120],"initiatives":[11],"to":[12,22,51,134],"secure":[13,24,57],"IoT":[14,39,141],"systems.":[15],"Password":[16],"strength":[17,35,43,124,138],"meters":[18,36],"can":[19],"guide":[20],"users":[21,50],"create":[23],"passwords,":[25],"but":[26,58],"in":[27,37,78],"our":[28],"investigation,":[29],"we":[30,63,129],"found":[31],"that":[32,111],"current":[33],"mainstream":[38],"systems":[40,142],"overestimate":[41],"passwords":[45,53,79],"with":[46],"digit":[47,76,87,116,150],"segments,":[48],"leading":[49],"choose":[52],"they":[54],"thought":[55],"were":[56],"are":[59],"actually":[60],"not.":[61],"Therefore,":[62],"conduct":[64],"a":[65,131],"more":[66],"in-depth":[67],"and":[68,94],"comprehensive":[69],"study":[70],"on":[71,122,144],"semantic":[73,88,91,104,113,147],"characteristics":[74,114,148],"segments":[77,117],"than":[80],"ever":[81],"before.":[82],"We":[83],"obtained":[84],"unpublished":[85],"high-frequency":[86,146],"patterns":[89],"through":[90],"extraction":[92],"methods":[93],"improved":[95],"PCFG":[97],"attack":[98],"by":[99],"utilizing":[100],"these":[101],"newly":[102],"discovered":[103],"pattern":[105],"characteristics.":[106],"The":[107],"experimental":[108],"results":[109],"show":[110],"have":[118],"an":[119],"impact":[121],"user":[126],"passwords.":[127],"Finally,":[128],"propose":[130],"feasible":[132],"scheme":[133],"improve":[135],"meter":[139],"for":[140],"based":[143],"segments.":[151]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-12-03T00:00:00"}
