Suggested Topics within your search.
Showing 1 - 7 results of 7 for search '"username"', query time: 0.03s Refine Results
  1. 1

    The Micro Economy Today / by Schiller, Bradley R., 1943-

    Published 2006
    View in OPAC
    Book
  2. 2

    Openstack authentication protocol based on digital certificate by Zhiqiang ZHU, Renhao LIN, Cuiyun HU

    Published 2019-02-01
    “…As the industry standard for open source cloud platforms,openstack uses the single-factor authentication method based on username and password that provides by keystone components to identity authentication mechanism,while it is not suitable for application scenarios with high security level requirements.A digital certificate-based identity authentication protocol which had cloud user identification protocol and authentication protocol was designed to meet the requirements.With expending the keystone component to achieve a digital certificate-based identity authentication system,a combination of authentication server,UKey technology,encryption technology and well-established key management and so on was used.According to the research,the system can effectively resist multiple cyber-attacks and improve the security of cloud users when they log in to the cloud platform.…”
    Get full text
    Article
  3. 3

    Optimasi Keamanan Web Server Terhadap Serangan Brute-Force Menggunakan Penetration Testing by Fahmi Fachri

    Published 2023-02-01
    “…Hasil uji coba simulasi serangan pada server berhasil dilakukan dengan mendapatkan username dan password, hal ini tentunya berbahaya system dapat diambil alih oleh penyusup. …”
    Get full text
    Article
  4. 4

    Sistem Berbasis Private Blockchain sebagai Penyedia Layanan Autentikasi Publisher-Broker-Subscriber Pada Protokol Message Queue Telemetry Transport by Muhammad Naufal Dzakie, Adhitya Bhawiyuga, Achmad Basuki

    Published 2022-08-01
    “… Protokol MQTT pada umumnya menggunakan username dan password untuk memvalidasi klien yang terhubung ke broker. …”
    Get full text
    Article
  5. 5
  6. 6

    Understanding Citizens’ Response to Social Activities on Twitter in US Metropolises During the COVID-19 Recovery Phase Using a Fine-Tuned Large Language Model: Application of AI by Ryuichi Saito, Sho Tsugawa

    Published 2025-02-01
    “…In addition, for privacy considerations, any identifiable information, such as author IDs and usernames, was excluded, retaining only the text for analysis. …”
    Get full text
    Article
  7. 7

    Explainable artificial intelligence in web phishing classification on secure IoT with cloud-based cyber-physical systems by Sultan Refa Alotaibi, Hend Khalid Alkahtani, Mohammed Aljebreen, Asma Alshuhail, Muhammad Kashif Saeed, Shouki A. Ebad, Wafa Sulaiman Almukadi, Moneerah Alotaibi

    Published 2025-01-01
    “…Generally, phishers use strategies such as advanced phishing software and fake emails to illegally acquire confidential details like usernames and passwords from financial accounts. This article develops an Explainable Artificial Intelligence with Aquila Optimization Algorithm in Web Phishing Classification (XAIAOA-WPC) approach on secure Cyber-Physical Systems. …”
    Get full text
    Article