Li, S., Romdhani, I., & Buchanan, W. (2016). Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, (32-36). doi:10.3969/j.issn.1673-5188.2016.S0.006. ISSN 16735188
Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the pat⁃
terns and vulnerabilities for both web and mobil...
Li, S., Tryfonas, T., & Li, H. (2016). The Internet of Things: a security point of view. Internet Research, 26(2), (337-359). doi:10.1108/IntR-07-2014-0173. ISSN 1066-2243
-- To provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technol...