[1]Han L. Password cracking and countermeasures in computer security: A survey[J]. arXiv preprint, arXiv:1411.7803, 2014[2]赵东东, 张东举, 许迅飞, 等. 基于攻击视角的密码猎人平台[J]. 信息安全研究, 2023, 9(S2): 5761[3]Kelley P G, Komanduri S, Mazurek M L, et al. Guess again (and again and again): Measuring password strength by simulating passwordcracking algorithms[C] Proc of the 2012 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2012: 523537[4]Tirado E, Turpin B, Beltz C, et al. A new distributed bruteforce password cracking technique[C] Proc of the 4th Int Conf on Future Network Systems and Security. Berlin: Springer, 2018: 117127[5]De Meo P, Ferrara E, Fiumara G, et al. Generalized louvain method for community detection in large networks[C] Proc of the 11th Int Conf on Intelligent Systems Design and Applications. Piscataway, NJ: IEEE, 2011: 8893[6]张鹏飞. 基于机器学习的入侵检测模型对比研究[J]. 信息安全研究, 2023, 9(8): 739744[7]Ali Hamza A, Jumma surayh AlJanabi R. Detecting brute force attacks using machine learning[EBOL]. [20240731]. https:www.semanticscholar.orgpaperDetectingBruteForceAttacksUsingMachineHamzaAlJanabic4b 9b625f2fd9d1cefd1f3f7ec634ff4ed192803[8]Wanjau S K, Wambugu G M, Kamau G N. SSHbrute force attack detection model based on deep learning[J]. International Journal of Computer Applications Technology and Research, 2021, 10(1): 4250[9]夏玮, 杨鹤标. 改进的Louvain算法及其在推荐领域的研究[J]. 信息技术, 2017, 41(11): 125128[10]Shanbhag S V. A faster version of Louvain method for community detection for efficient modeling and analytics of cyber systems[D]. West Lafayette: Purdue University, 2016 |