Zobrazeno 1 - 10
of 2 559
pro vyhledávání: '"CAPTCHA"'
Autor:
Manivannan, Aravinth1 (AUTHOR) realaravinth@batsense.net, Sethuraman, Sibi Chakkaravarthy2 (AUTHOR) sb.sibi@gmail.com, Vimala Sudhakaran, Devi Priya1 (AUTHOR) vsdevipriya@gmail.com
Publikováno v:
Communications of the ACM. Oct2024, Vol. 67 Issue 10, p70-80. 11p.
Autor:
Justie, Brian1
Publikováno v:
Internet Histories. Mar2021, Vol. 5 Issue 1, p30-47. 18p.
Publikováno v:
IEEE Access, Vol 12, Pp 112211-112231 (2024)
While text-based CAPTCHAs have been the predominant type of human interaction proofs (HIPs) for many years, image recognition challenges have also gained significant attention. This trend is due, on one hand, to groundbreaking advancements in solving
Externí odkaz:
https://doaj.org/article/ecc61b46c8da4f8da768d0c66b43fcd5
Autor:
Agarwal, Shubham
Publikováno v:
MIT Technology Review. Nov/Dec2023, Vol. 126 Issue 6, p14-14. 1p.
Autor:
Lorenzi, David1 dlorenzi@rutgers.edu, Uzun, Emre1, Vaidya, Jaideep1 jsvaidya@rutgers.edu, Sural, Shamik2 shamik@cse.iitkgp.ernet.in, Atluri, Vijayalakshmi1
Publikováno v:
Journal of Computer Security. 2018, Vol. 26 Issue 6, p731-760. 30p.
Publikováno v:
Iraqi Journal for Computer Science and Mathematics, Vol 5, Iss 3 (2024)
CAPTCHAs (Completely Automated Public Turing Test to Tell Computers and Humans Apart) have become universal in web security systems to differentiate between automated bots and human users. This research presents a novel approach for generating and cl
Externí odkaz:
https://doaj.org/article/e2d0d1f283fd465baa7af7a3bc70fab0
Publikováno v:
IEEE Access, Vol 12, Pp 47190-47209 (2024)
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) has long been employed to combat automated bots. It accomplishes this by utilizing distortion techniques and cognitive characteristics. When it comes to countering s
Externí odkaz:
https://doaj.org/article/22b602abbe0c4a14a2823e25d83dc714
Autor:
Mohamed, Manar1, Song Gao2, Sachdeva, Niharika3, Saxena, Nitesh4 saxena@uab.edu, Chengcui Zhang4, Ponnurangam Kumaraguru3, Van Oorschote, Paul C.5
Publikováno v:
Journal of Computer Security. 2017, Vol. 25 Issue 3, p205-230. 26p.
Autor:
Mehrnezhad, Maryam1 m.mehrnezhad@ncl.ac.uk, Ghaemi Bafghi, Abbas2 ghaemib@um.ac.ir, Harati, Ahad2 a.harati@um.ac.ir, Toreini, Ehsan1 ehsan.toreini@ncl.ac.uk
Publikováno v:
International Journal of Information Security. Apr2017, Vol. 16 Issue 2, p133-149. 17p.
Autor:
Omotayo, Funmilola Olubunmi1 lolaogunesan@yahoo.com
Publikováno v:
Information Technologist. Jun2018, Vol. 15 Issue 1, p263-273. 21p.