期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
PhishGuard: Integrating Fine-Tuned Large Language Models (LLMs) into Password Management
1
作者 Smith Patel Vijay K. Madisetti 《Journal of Information Security》 2024年第4期474-493,共20页
In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approac... In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approach to embedding sophisticated phishing detection within a password manager’s framework, called PhishGuard. PhishGuard uses a Large Language Model (LLM), specifically a fine-tuned BERT algorithm that works in real time, where URLs fed by the user in the credentials are analyzed and authenticated. This approach enhances user security with its provision of real-time protection from phishing attempts. Through rigorous testing, this paper illustrates how PhishGuard has scored well in tests that measure accuracy, precision, recall, and false positive rates. 展开更多
关键词 Phishing Attacks password Management Phishing Detection AI BERT Algorithm real-Time Protection CYBERSECURITY URL Authentication
下载PDF
基于属性拆分与数据挖掘的真实口令分析 被引量:5
2
作者 郭奕东 邱卫东 刘伯仲 《计算机工程》 CAS CSCD 2014年第7期254-257,共4页
目前对网络口令安全性的研究通常集中在通信协议和加密算法的安全性分析上,较少涉及用户设置口令行为本身。为此,提出一种新的口令分析方法。通过设置口令属性,对原始口令依次进行属性拆分、属性归类,采用Apriori算法对归类后的口令属... 目前对网络口令安全性的研究通常集中在通信协议和加密算法的安全性分析上,较少涉及用户设置口令行为本身。为此,提出一种新的口令分析方法。通过设置口令属性,对原始口令依次进行属性拆分、属性归类,采用Apriori算法对归类后的口令属性进行数据挖掘,获得用户设置口令的内在特征。实验结果表明,该方法能够有效地从CSDN泄露的口令中分析出真实用户设置口令的习惯。用户设置的口令中存在大量弱口令,纯数字口令占总量的45.03%,姓氏拼音与数字的组合构成口令的另一大部分,占13.79%。能够在24 min之内分析处理642万条口令,可有效应对海量口令数据。 展开更多
关键词 口令安全 口令分析 真实口令 口令属性 数据挖掘 Apriori关联算法
下载PDF
远程门禁系统的探讨与研究
3
作者 徐晓林 赵益丹 周振峰 《嘉兴学院学报》 2003年第z1期100-102,共3页
此课题主要利用串行通信构建了上住机为PC机、下位机为多个单片机的多级网络系统,并具体介绍了利用 VB6.0实现PC机对多个单片机的远程实时监控。
关键词 PC机 单片机 串行通信 实时监控 RS-232 RS-485 VB6.0 电子密码锁.
下载PDF
Scalable protocol for cross-domain group password-based authenticated key exchange 被引量:2
4
作者 Cong GUO Zijian ZHANG Liehuang ZHU Yu-an TAN Zhen YANG 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第1期157-169,共13页
Cross-domain password-based authenticated key exchange (PAKE) protocols have been studied for many years. However, these protocols are mainly focusing on multi-participant within a single domain in an open network e... Cross-domain password-based authenticated key exchange (PAKE) protocols have been studied for many years. However, these protocols are mainly focusing on multi-participant within a single domain in an open network environment. This paper proposes a novel approach for designing a cross-domain group PAKE protocol, that primarily handles with the setting of multi-participant in the multi- domain. Moreover, our protocol is proved secure against active adversary in the Real-or-Random (ROR) model. In our protocol, no interaction occurs between any two domain authentication servers. They are regarded as ephemeral certificate authorities (CAs) to certify key materials that participants might subsequently use to exchange and agree on group session key. We further justify the computational complexity and measure the average computation time of our protocol. To the best of our knowledge, this is the first work to analyze and discuss a provably secure multi-participant cross-domain group PAKE protocol. 展开更多
关键词 cross-domain password-based authenticated key exchange (PAKE) group key exchange real-Or-Random (ROR) model provable secure
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部