Academic literature on the topic 'Credential stuffing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Credential stuffing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Credential stuffing"
Tankard, Colin. "Credential stuffing – the new hack." Network Security 2021, no. 2 (February 2021): 20. http://dx.doi.org/10.1016/s1353-4858(21)00021-0.
Full textRees-Pullman, Steven. "Is credential stuffing the new phishing?" Computer Fraud & Security 2020, no. 7 (July 2020): 16–19. http://dx.doi.org/10.1016/s1361-3723(20)30076-2.
Full textNathan, Mike. "Credential stuffing: new tools and stolen data drive continued attacks." Computer Fraud & Security 2020, no. 12 (December 2020): 18–19. http://dx.doi.org/10.1016/s1361-3723(20)30130-5.
Full textHussain, Maria. "Unholy Wars." American Journal of Islam and Society 20, no. 1 (January 1, 2003): 140–43. http://dx.doi.org/10.35632/ajis.v20i1.1881.
Full textPatra, Rohan, and Sandip Patra. "Cryptography: A Quantitative Analysis of the Effectiveness of Various Password Storage Techniques." Journal of Student Research 10, no. 3 (October 10, 2021). http://dx.doi.org/10.47611/jsrhs.v10i3.1764.
Full textBook chapters on the topic "Credential stuffing"
Zhang, Qi. "Detecting Credential Stuffing Between Servers." In Security, Privacy, and Anonymity in Computation, Communication, and Storage, 454–64. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68884-4_38.
Full textFietkau, Julian, Syeda Mehak Zahra, and Markus Hartung. "Secure Authentication for Everyone! Enabling 2nd-Factor Authentication Under Real-World Constraints." In Communications in Computer and Information Science, 89–101. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_8.
Full textConference papers on the topic "Credential stuffing"
Pal, Bijeeta, Tal Daniel, Rahul Chatterjee, and Thomas Ristenpart. "Beyond Credential Stuffing: Password Similarity Models Using Neural Networks." In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019. http://dx.doi.org/10.1109/sp.2019.00056.
Full textNguyen Ba, Minh Hieu, Jacob Bennett, Michael Gallagher, and Suman Bhunia. "A Case Study of Credential Stuffing Attack: Canva Data Breach." In 2021 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2021. http://dx.doi.org/10.1109/csci54926.2021.00187.
Full text