[1] GULENKO I. Improving passwords:influence of emotions on security behavior[J]. Information Management & Computer Security, 2014, 22(2):167-178. [2] SHEN C, YU T W, XU H D, et al. User practice in password security:an empirical study of real-life passwords in the wild[J]. Computers & Security, 2016, 61:130-141. [3] WANG D, CHENG H, WANG P, et al. Zipf's law in passwords[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(11):2776-2791. [4] BROWN B J, CALLIS K. Computer password choice and personality traits among college students[R]. Cape Girardeau:Southeast Missouri State University, 2004. [5] FLORENCIO D, HERLEY C. A large-scale study of Web password habits[C]//WWW 2007:Proceedings of the 200716th International Conference on World Wide Web. New York:ACM, 2007:657-666. [6] LI Z G, HAN W L, XU W Y. A large-scale empirical analysis of Chinese Web passwords[C]//Proceedings of the 23rd USENIX conference on Security Symposium. Berkeley, CA:USENIX Association, 2014:559-574. [7] 郭奕东,邱卫东,刘伯仲.基于属性拆分与数据挖掘的真实口令分析[J].计算机工程,2014,40(7):254-257.(GUO Y D, QIU W D, LIU B Z. Analysis of real password based on attributes resolution and data mining[J]. Computer Engineering, 2014, 40(7):254-257.) [8] 高强,李啸,胡勇,等.基于社工信息的口令生成与安全性分析[J].通信技术,2017,50(7):1511-1516.(GAO Q, LI X, HU Y, et al. Password generation and security analysis based on social engineering[J]. Communications Technology,2017, 50(7):1511-1516.) [9] 刘功申,邱卫东,孟魁,等.基于真实数据挖掘的口令脆弱性评估及恢复[J].计算机学报,2016,39(3):454-467.(LIU G S, QIU W D, MENG K, et al. Password vulnerability assessment and recovery based on rules mined from large-scale real data[J]. Chinese Journal of Computers, 2016, 39(3):454-467.) [10] ZENG J P, DUAN J J, WU C R. Empirical study on lexical sentiment in passwords from Chinese websites[J]. Computers & Security, 2019, 80:200-210. [11] NARAYANAN A, SHMATIKOV V. Fast dictionary attacks on passwords using time-space tradeoff[C]//CCS 2005:Proceedings of 201512th ACM Conference on Computer and Communications Security. New York:ACM, 2005:364-372. [12] VERAS R, COLLINS C, THORPE J. On the semantic patterns of passwords and their security impact[C]//NDSS 2014:Proceedings of the 2014 Network and Distributed System Security Symposium. San Diego, CA:Internet Society, 2014:3-9. [13] LI Y, WANG H N, SUN K. Personal information in passwords and its security implications[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(10):2320-2333. [14] 卢致旭,邱卫东,廖凌.基于数据挖掘技术的字典生成方法[J].信息安全与通信保密,2011,9(11):63-65.(LU Z X, QIU W D, LIAO L. Generation of password dictionary based on data mining technology[J]. China Information Security, 2011, 9(11):63-65.) [15] 邹静,林东岱,郝春辉.一种基于结构划分概率的口令攻击方法[J].计算机学报,2014(5):1206-1215.(ZOU J, LIN D D, HAO C H. A password cracking method based on structure division probability[J]. Chinese Journal of Computers, 2014(5):1206-1215.) [16] HITAJ B, GASTI P, ATENIESE G, et al. PassGAN:a deep learning approach for password guessing[EB/OL].[2018-09-16]. https://arxiv.org/pdf/1709.00440.pdf. [17] MALONE D, MAHER K. Investigating the distribution of password choices[C]//WWW 2012:Proceedings of the 21st International Conference on World Wide Web. New York:ACM, 2012:301-310. |