{"id":"https://openalex.org/W4388510040","doi":"https://doi.org/10.1186/s42400-023-00193-6","title":"Performance evaluation of Cuckoo filters as an enhancement tool for password cracking","display_name":"Performance evaluation of Cuckoo filters as an enhancement tool for password cracking","publication_year":2023,"publication_date":"2023-11-09","ids":{"openalex":"https://openalex.org/W4388510040","doi":"https://doi.org/10.1186/s42400-023-00193-6"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-023-00193-6","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1186/s42400-023-00193-6","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00193-6","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00193-6","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086573872","display_name":"Maria\u2010Dolores Cano","orcid":"https://orcid.org/0000-0003-4952-0325"},"institutions":[{"id":"https://openalex.org/I3123212020","display_name":"Universidad Polit\u00e9cnica de Cartagena","ror":"https://ror.org/02k5kx966","country_code":"ES","type":"education","lineage":["https://openalex.org/I3123212020"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Maria-Dolores Cano","raw_affiliation_strings":["Department of Information and Communication Technologies, Universidad Polit\u00e9cnica de Cartagena, 30202, Cartagena, Spain","Department of Information and Communication Technologies, Universidad Polit\u00e9cnica de Cartagena, Cartagena, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Technologies, Universidad Polit\u00e9cnica de Cartagena, 30202, Cartagena, Spain","institution_ids":["https://openalex.org/I3123212020"]},{"raw_affiliation_string":"Department of Information and Communication Technologies, Universidad Polit\u00e9cnica de Cartagena, Cartagena, Spain","institution_ids":["https://openalex.org/I3123212020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008145693","display_name":"Antonio Villafranca","orcid":"https://orcid.org/0009-0005-8922-192X"},"institutions":[{"id":"https://openalex.org/I3123212020","display_name":"Universidad Polit\u00e9cnica de Cartagena","ror":"https://ror.org/02k5kx966","country_code":"ES","type":"education","lineage":["https://openalex.org/I3123212020"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Antonio Villafranca","raw_affiliation_strings":["Department of Information and Communication Technologies, Universidad Polit\u00e9cnica de Cartagena, 30202, Cartagena, Spain","Department of Information and Communication Technologies, Universidad Polit\u00e9cnica de Cartagena, Cartagena, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Technologies, Universidad Polit\u00e9cnica de Cartagena, 30202, Cartagena, Spain","institution_ids":["https://openalex.org/I3123212020"]},{"raw_affiliation_string":"Department of Information and Communication Technologies, Universidad Polit\u00e9cnica de Cartagena, Cartagena, Spain","institution_ids":["https://openalex.org/I3123212020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003951390","display_name":"Igor Tasic","orcid":"https://orcid.org/0000-0003-4059-8134"},"institutions":[{"id":"https://openalex.org/I3123212020","display_name":"Universidad Polit\u00e9cnica de Cartagena","ror":"https://ror.org/02k5kx966","country_code":"ES","type":"education","lineage":["https://openalex.org/I3123212020"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Igor Tasic","raw_affiliation_strings":["Department of Information and Communication Technologies, Universidad Polit\u00e9cnica de Cartagena, 30202, Cartagena, Spain","Department of Information and Communication Technologies, Universidad Polit\u00e9cnica de Cartagena, Cartagena, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Technologies, Universidad Polit\u00e9cnica de Cartagena, 30202, Cartagena, Spain","institution_ids":["https://openalex.org/I3123212020"]},{"raw_affiliation_string":"Department of Information and Communication Technologies, Universidad Polit\u00e9cnica de Cartagena, Cartagena, Spain","institution_ids":["https://openalex.org/I3123212020"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5086573872"],"corresponding_institution_ids":["https://openalex.org/I3123212020"],"apc_list":null,"apc_paid":null,"fwci":0.1962,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.46509183,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.877669095993042},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7461729049682617},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.7178584337234497},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.593418300151825},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5121912360191345},{"id":"https://openalex.org/keywords/cuckoo-search","display_name":"Cuckoo search","score":0.4433259963989258},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.4180905222892761},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.342485636472702},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.28677529096603394},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08770692348480225},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.07387253642082214}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.877669095993042},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7461729049682617},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.7178584337234497},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.593418300151825},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5121912360191345},{"id":"https://openalex.org/C117241572","wikidata":"https://www.wikidata.org/wiki/Q5192379","display_name":"Cuckoo search","level":3,"score":0.4433259963989258},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.4180905222892761},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.342485636472702},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.28677529096603394},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08770692348480225},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.07387253642082214},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1186/s42400-023-00193-6","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1186/s42400-023-00193-6","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00193-6","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:repositorio.upct.es:10317/13769","is_oa":true,"landing_page_url":"http://hdl.handle.net/10317/13769","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-023-00193-6.pdf","source":{"id":"https://openalex.org/S4306401372","display_name":"Digital Repository (Polytechnic University of Cartagena)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I3123212020","host_organization_name":"Universidad Polit\u00e9cnica de Cartagena","host_organization_lineage":["https://openalex.org/I3123212020"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:f72c2d52ccc4468296e17d692becec2d","is_oa":true,"landing_page_url":"https://doaj.org/article/f72c2d52ccc4468296e17d692becec2d","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 6, Iss 1, Pp 1-11 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-023-00193-6","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1186/s42400-023-00193-6","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00193-6","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7799999713897705}],"awards":[{"id":"https://openalex.org/G1320060331","display_name":null,"funder_award_id":"MCIN/AEI/10.13039/50110001103","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G1598597440","display_name":null,"funder_award_id":"MCIN/AEI/10.13039/5011000110","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G1643949827","display_name":null,"funder_award_id":"AEI/10.13039/501100011033","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G2262748287","display_name":null,"funder_award_id":"501100011033","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G2969783435","display_name":null,"funder_award_id":"CIN/AEI/10.13039/501100011033","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G300979063","display_name":null,"funder_award_id":"10.13039/501100011033","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G3219925899","display_name":null,"funder_award_id":"MCIN/AEI/10.13039/501100011033","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G3429648993","display_name":null,"funder_award_id":"PID202","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G3480869486","display_name":null,"funder_award_id":"13039","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G4126322094","display_name":null,"funder_award_id":"01100011033","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G5080475149","display_name":null,"funder_award_id":"10.13039","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G661330594","display_name":null,"funder_award_id":"00110","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G6685425346","display_name":null,"funder_award_id":"0011033","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G7084143925","display_name":null,"funder_award_id":"AEI/10","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G7266728691","display_name":null,"funder_award_id":"13039/501100011033","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G7535663061","display_name":null,"funder_award_id":"AEI/10.","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G8260616629","display_name":null,"funder_award_id":"011033","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G8638682022","display_name":null,"funder_award_id":"10.13039/50110001103","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"}],"funders":[{"id":"https://openalex.org/F4320335598","display_name":"Agencia Estatal de Investigaci\u00f3n","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4388510040.pdf","grobid_xml":"https://content.openalex.org/works/W4388510040.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W1967373117","https://openalex.org/W2019578814","https://openalex.org/W2030112111","https://openalex.org/W2048755632","https://openalex.org/W2053030258","https://openalex.org/W2076879452","https://openalex.org/W2080051698","https://openalex.org/W2086553822","https://openalex.org/W2090075778","https://openalex.org/W2123845384","https://openalex.org/W2126540423","https://openalex.org/W2135359429","https://openalex.org/W2524553946","https://openalex.org/W2794001933","https://openalex.org/W2963532563","https://openalex.org/W2982034297","https://openalex.org/W3003710106","https://openalex.org/W3088677962","https://openalex.org/W3092367696","https://openalex.org/W3114846425","https://openalex.org/W3119938721","https://openalex.org/W3131433033","https://openalex.org/W3136682179","https://openalex.org/W3138570739","https://openalex.org/W3158562336","https://openalex.org/W3159217552","https://openalex.org/W4205610099","https://openalex.org/W4210296929","https://openalex.org/W4212960548"],"related_works":["https://openalex.org/W2989690789","https://openalex.org/W2969720675","https://openalex.org/W2953105088","https://openalex.org/W2021087413","https://openalex.org/W3110679839","https://openalex.org/W3088784215","https://openalex.org/W72859687","https://openalex.org/W1639969416","https://openalex.org/W2054626033","https://openalex.org/W2949495265"],"abstract_inverted_index":{"Abstract":[0],"Cyberthreats":[1],"continue":[2],"their":[3],"expansion,":[4],"becoming":[5],"more":[6,8,106],"and":[7,10,14,40,72],"complex":[9],"varied.":[11],"However,":[12],"credentials":[13],"passwords":[15],"are":[16],"still":[17],"a":[18,27,95,119],"critical":[19],"point":[20],"in":[21,52,61,108,122],"security.":[22],"Password":[23],"cracking":[24],"can":[25],"be":[26],"powerful":[28],"tool":[29],"to":[30,45,113],"fight":[31],"against":[32],"cyber":[33],"criminals":[34],"if":[35],"used":[36],"by":[37],"cybersecurity":[38],"professionals":[39],"red":[41],"teams,":[42],"for":[43],"instance,":[44],"evaluate":[46],"compliance":[47],"with":[48,94],"security":[49],"policies":[50],"or":[51,67],"forensic":[53],"investigations.":[54],"For":[55],"particular":[56],"systems,":[57],"one":[58],"crucial":[59],"step":[60],"the":[62],"password-cracking":[63],"process":[64],"is":[65,101],"comparison":[66],"matchmaking":[68],"between":[69],"password-guess":[70],"hashes":[71],"real":[73],"hashes.":[74],"We":[75],"hypothesize":[76],"that":[77],"using":[78],"newer":[79],"data":[80,99,115],"structures":[81,116],"such":[82],"as":[83],"Cuckoo":[84],"filters":[85],"could":[86],"optimize":[87],"this":[88,98],"process.":[89],"Experimental":[90],"results":[91],"show":[92],"that,":[93],"proper":[96],"configuration,":[97],"structure":[100],"two":[102],"orders":[103],"of":[104,110,124],"magnitude":[105],"efficient":[107],"terms":[109,123],"size/usage":[111],"compared":[112],"other":[114],"while":[117],"keeping":[118],"comparable":[120],"performance":[121],"time.":[125]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
