<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>BISEC'</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Interactive Cybersecurity Awareness: Creating a Gamified Password Strength Checker with Unity</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Miloš Kostić</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Igor Saveljić</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Faculty of Information Technology, Belgrade Metropolitan University</institution>
          ,
          <addr-line>Tadeuša Košćuška 63, 11000 Belgrade</addr-line>
          ,
          <country country="RS">Serbia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute for Information Technologies, University of Kragujevac</institution>
          ,
          <addr-line>Jovana Cvijića bb, 34000 Kragujevac</addr-line>
          ,
          <country country="RS">Serbia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <volume>15</volume>
      <fpage>28</fpage>
      <lpage>29</lpage>
      <abstract>
        <p>In an increasingly digital world, passwords serve as crucial barriers protecting personal information across various online platforms. However, many users remain unaware of the significance of strong password practices, making them vulnerable to cyber threats. This paper explores the urgent need for enhanced security awareness and improved password strategies, proposing the integration of gamification as an innovative educational approach. Paper discusses the development of the "Lockedout" game, which employs a Unity-based password strength checker that not only evaluates passwords against traditional criteria but also incorporates advanced techniques, including Markov Models. These models analyze character transitions to provide a more nuanced assessment of password strength, particularly against common vulnerabilities. By transforming the learning process into an engaging, interactive experience, "Lockedout" aims to foster better password habits among players, making cybersecurity education both efective and enjoyable. Ultimately, this paper illustrates how gamification can significantly impact the understanding and implementation of strong password practices, addressing a critical gap in current cybersecurity eforts.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Gamification</kwd>
        <kwd>Cybersecurity awareness</kwd>
        <kwd>Unity</kwd>
        <kwd>Password strength validation</kwd>
        <kwd>Markov Model</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>In an era where our lives are increasingly intertwined with digital platforms, passwords have emerged
as a vital line of defense in protecting our personal information. From social media accounts to online
banking, passwords serve as the gatekeepers to our digital identities. However, many users remain
unaware of the critical importance of strong passwords, leaving them susceptible to cyber threats.
This paper aims to tackle this pressing issue by enhancing security awareness and encouraging better
password practices through the innovative use of gamification.</p>
      <p>
        This paper will delve into the significance of raising awareness around password strength and explore
how gamification can be efectively integrated into educational frameworks. Additionally, it will present
the ongoing development of the "Lockedout" game, specifically focusing on the Unity implementation of
password strength checkers [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. We will analyze potential weaknesses in standard password checking
algorithms and address them through the implementation of a Markov Model approach, tailored for
more advanced players. By merging entertainment with education, this paper seeks to illustrate how
gamification can create a more impactful learning experience in the realm of password security.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Importance of password strength awareness</title>
      <p>
        The rapid expansion of online services has made secure authentication mechanisms more important
than ever. At the center of this security are passwords, which are the primary method of protecting
personal and sensitive data from unauthorized access. Weak passwords remain one of the most exploited
vulnerabilities in cyberattacks [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], often providing an easy entry point for attackers through brute force,
dictionary attacks, or credential stufing [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Despite technological advances, many users still rely on
simple, predictable passwords, leaving their accounts at risk.
      </p>
      <p>Weak passwords often result from users prioritizing convenience over security. Simple passwords
are easier to remember but equally easy to guess. With data breaches becoming more common, weak
passwords are frequently found on password blacklists, where they are cataloged and used for automated
attacks. The growing sophistication of cyberattacks makes it vital for users to create passwords that
resist such tactics.</p>
      <p>
        Creating and managing strong passwords remains a significant challenge for users, prompting a
wealth of research dedicated to this issue [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ]. Recent studies have shown that some password
meters do efectively guide users toward better password choices, ofering a glimmer of hope in this
area. However, these meters are typically based on ad hoc designs, and most vendors fail to provide
transparency regarding their design choices [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        Traditional checkers often rely on basic rules, such as requiring specific numbers or special characters,
resulting in low accuracy, where insecure passwords may be accepted while secure ones are rejected.
This can harm both security and usability, as users frequently resort to predictable modifications (e.g.
"password1") [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Adaptive Password Strength Meters based on Markov models [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ] appeared as a
valid solution to this problem, since they provide a more accurate assessment of password strength by
estimating the probabilities of the n-grams that comprise the passwords.
      </p>
      <p>Markov Models are commonly used in statistical prediction and pattern recognition and can ofer
more sophisticated password strength evaluations by analyzing character sequences and predicting
the likelihood of certain character combinations. In password security, a Markov Model helps estimate
the strength of a password based on the probability of its character sequence appearing in common
datasets, such as often online available dictionaries of known passwords.</p>
      <p>In light of the above, it is essential to enhance awareness of password security to address one of the
most significant gaps in cybersecurity today. Many users do not realize how vulnerable their accounts
are to compromise through weak or reused passwords.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Gamification</title>
      <p>
        Gamification has grown into a powerful tool across various industries, from education to marketing
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], and most notably, in enhancing user engagement with otherwise mundane tasks. In this context,
gamification refers to the incorporation of game mechanics, such as points, challenges, and rewards,
into non-game activities to encourage participation and motivation. By turning traditionally often dry
subjects like cybersecurity into an interactive experience, users are more likely to retain information
and develop better habits.
      </p>
      <p>
        Gamification is particularly relevant in the field of cybersecurity awareness [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">10, 11, 12</xref>
        ] because it
transforms learning about security practices, such as importance of creating strong passwords, from
a chore into a challenge. By integrating these elements into a game form, players not only have fun
but are also subconsciously learning valuable skills. The mechanics of password creation, strength
evaluation, and cracking are turned into engaging, playable scenarios that reinforce good security
habits. Through this approach, the game promotes active learning and critical thinking, making players
more aware of the risks associated with weak passwords and the importance of creating strong ones.
      </p>
      <p>
        Research has shown that gamified learning increases retention and motivates users to engage more
deeply with the material [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. In cybersecurity, where awareness is crucial, this method ensures that
users internalize the importance of strong password practices. The "Lockedout" game’s core mechanic
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], evaluating password strength, plays directly into this by challenging players to think critically
about password creation. The end result is a player base that is not only entertained but also better
prepared to handle real-world security challenges.
4. ”Lockedout” Game concept
”Lockedout” [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] aims to blend education with entertainment, and it is designed to teach players about
password strength and cybersecurity best practices (Fig. 1.) through some interesting time based
challenges. Game introduces players to the fundamentals of password strength in an intuitive and
engaging way, raising awareness in a manner that goes beyond typical informational campaigns. Design
emphasizes the significance of strong passwords and encourages users to adopt better habits especially
when making decisions in time limited situations.
      </p>
      <p>Game concept considers overall slow start with an old computer monitor featuring an operating
system login window. Scattered sticky notes with careless credentials invite players to access the
system. Upon entry, they encounter a desktop with a text document titled "MyPasswords.txt" and five
applications: "Email," "Bank," "Chat," "Social," and "Shopping" (Fig. 2.).</p>
      <p>As players interact with the chat application, a sudden notification from a friend about recent data
breaches interrupts their conversation, accompanied by an OS Guard (some form of system cybersecurity
protector) warning of an ongoing cyberattack. This pushes players into a race against time to replace
passwords for personal profiles in every app. Each app features a red timer that emphasizes the urgency
of changing passwords. Players must meet strict password strength criteria while managing limited
change attempts. Failure to act leads to hackers taking control of their accounts, intensifying the
urgency. The ultimate goal is to secure as many accounts as possible, culminating in a victory for those
who succeed.</p>
      <p>After the game, an epilogue summarizes password security best practices and explains the weaknesses
of the initial passwords, providing players with resources for further learning.</p>
    </sec>
    <sec id="sec-4">
      <title>5. Unity Engine</title>
      <p>
        Unity [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] is one of the most widely used game engines in the world, known for its versatility and
cross-platform capabilities. It provides developers with the tools necessary to create 2D and 3D games,
simulations, and other interactive content. Unity’s ease of use, combined with its powerful scripting
engine based on C#.
      </p>
      <p>The decision to use Unity for "Lockedout" was primarily based on the engine’s flexibility and strong
community support. Unity’s intuitive development environment allows for rapid prototyping, which
is essential for a game that needs constant testing and refinement. For this project, Unity’s scripting
lfexibility made it easy to integrate the password checker algorithm, enabling real-time feedback for
players.</p>
      <p>Unity’s robust C# scripting environment was particularly advantageous in building the password
strength checker. By leveraging Unity’s UI and backend functionality, the password checker seamlessly
integrates into the gameplay, providing real-time strength feedback and enhancing the overall player
experience.</p>
    </sec>
    <sec id="sec-5">
      <title>6. Implementation</title>
      <p>The password strength checker, along with OS Guard is integral to the game’s progression system.
As players attempt to solve in-game puzzles, they must generate passwords that pass the strength
requirements which will depend on game dificulty level.</p>
      <p>Basic idea is that at low dificulty level, aimed for players with basic or no cybersecurity knowledge,
next to lower strength value required to pass, a traditional password checker evaluates the length, use
of numbers, capital letters, and symbols. However, at higher dificulty levels, the game will introduce a
more advanced checker, incorporating a Markov Model, which prevents the use of weak, potentially
blacklisted passwords.</p>
      <p>This provides an additional layer of challenge, ensuring that the player is constantly encouraged to
think critically about password security.</p>
      <sec id="sec-5-1">
        <title>6.1. Traditional Password Strength Checker</title>
        <p>The first step in the development of the password strength checker for the "Lockedout" game was the
implementation of a traditional password checking algorithm. This foundational system is designed to
evaluate passwords based on standard criteria that are commonly used in most password validation
systems. These criteria include:
• Password length: Ensuring the password meets a minimum number of characters (often 8
characters).
• Use of uppercase letters: Encouraging the inclusion of at least one uppercase letter to add
complexity.
• Use of lowercase letters: This helps prevent the use of all-uppercase passwords, which can also
occur accidentally if the "Caps Lock" feature is enabled while creating the password.
• Use of numbers: Checking for the presence of numerical digits within the password.
• Inclusion of symbols: Ensuring special characters or symbols (e.g. ! " # $ % &amp; ’ ( ) – 33 characters
in total) are used to further increase password dificulty.</p>
        <p>Traditional checker is implemented in C# script by using simple if/else if conditions and integrated
directly into the Unity engine. For each condition password successfully meet, strength is rewarded
with added value. Total score password can achieve goes from 0 to 5. The system automatically validates
each password while it is being entered by the player and assigns a corresponding strength level based
on the criteria mentioned above.</p>
        <p>The engine’s ease of handling UI elements, such as text input fields and slider elements provided the
perfect platform to implement this feature smoothly. The checker updates immediately while player
enter passwords, adjusting the strength meter slider shown on screen, ofering immediate feedback to
the player.</p>
        <p>However, while this system covers the basics and introduces players to the concept of password
strength, it is not foolproof. One significant limitation is its inability to identify blacklisted or commonly
used passwords. This shortfall opens up the possibility that easily guessed or widely used passwords
(e.g., "123456" or "password") could still pass as valid. This limitation is especially concerning in the
context of the "Lockedout" goal of educating players to properly define passwords.</p>
      </sec>
      <sec id="sec-5-2">
        <title>6.2. Markov Model Probability Integration</title>
        <p>To address the shortcomings of the traditional password checker and provide an additional layer of
complexity which can be used in the hard dificulty of the game, two modifications are introduced:
• Detection of black listed passwords
• Markov Model of probability calculation</p>
        <p>
          For sake of providing working data for both mentioned changes, at the beginning of the game a
dataset of 999998 known weak or blacklisted passwords obtained in form of the text document [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] is
loaded.
        </p>
        <p>First problem of eliminating blacklisted password as a valid option is done through simple comparison
of entered password with created and loaded list of passwords, while also notifying the player about
the match.</p>
        <p>The basic idea of Markov Model implementation involves training the model on a large dataset of
real-world passwords to learn the probabilities of transitions between characters or groups of characters
(-grams). Once trained, the model can estimate the probability of successfully breaking a password
through cyber-attacks.</p>
        <p>During the training process, model might learn for example that the letter "e" often follows the letter
"th" (as in "the") or those certain letter combinations like "the" occur more frequently.</p>
        <p>In the context of the “Lockedout” game, third-order Markov Model was chosen for the implementation,
which considers the probability of a character appearing based on the three preceding characters. This
allows more refined estimation of the password’s structure and can flag weak or predictable passwords
that the traditional checker might miss. Some initial tests were done with first order Markov Model but
they gave poor results, because player could get false positives. The model is fundamentally composed
of two dictionaries: one that tracks transition counts between pairs of characters (mapping the current
pair to the next character) and another that records the total occurrences for each character pair.</p>
        <p>Model is trained on the list of nearly 1 million most often used passwords. Training process considers
iteration through each character in the password player enters, by observing groups of three characters.
Algorithm, initially selects the first two characters as a pair, followed by the third character that comes
after this pair. For each pair of characters, the frequency of a specific third character appearing after
them is tracked. If the pair of characters has not been encountered before, a space in memory is allocated
to store the potential characters that could follow. Each time the same pair of characters is followed by
the same third character, the count is increased. This process builds a map of how pairs of characters
transition to others, capturing common patterns in the passwords and creating a record of the most
likely sequences.</p>
        <p>The model then assigns a probability score to any entered password, and the high score indicates a
likelihood of the password being weak or easily guessable.</p>
        <p>Implemented Markov Model algorithm required additional adjustments in order to reduce the penalty
added to probability estimation which by default occurs as password length increase. The resulting
probability estimation is combined with the basic algorithm’s strength estimation to produce a final
result. These values can be integrated in various ways. In this case, we decided to subtract the probability
from the strength estimation to lower the score for highly probable passwords while rewarding unique
ones. It is important to note that some tests were conducted with equal contributions from both values
(50% each), but the results were not satisfactory for our purposes.</p>
        <p>Goal of introducing the Markov Model was to make the password strength checker more robust.
Idea that game system can diferentiate between a password that merely satisfies basic criteria (length,
symbols, numbers, etc.) and one that is truly secure was valuable considering that game will have
diferent dificulties.</p>
      </sec>
      <sec id="sec-5-3">
        <title>6.3. Testing and comparison</title>
        <p>Various tests were conducted on the latest version of the code to evaluate the performance of each
algorithm, and the results are presented in three diferent sliders within the game for testing purposes.</p>
        <p>
          1. Several tests with known blacklisted passwords were positive and screen notification of blacklisted
password was activated (Fig. 4.).
2. Modifications of the entry ”P@ssw0rd” gave some results, but it’s clear that combined approach
better detects still problematic entry (Fig. 5.).
3. Further changes by adding special characters to distance from previous entries show improvement
in results (Fig. 6.).
4. Last test was done with automatically generated password, using Avast online password generator
[
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. As expected this kind of password assembled through random combination of letters,
numbers and signs achieved high score, which is why these kinds of passwords are often used by
various high profile password manager applications. (Figs. 7. and 8.)
        </p>
        <p>The numerical results of the tests are presented in Table 1, where  denotes the Traditional algorithm,
 represents the Markov Model probability value, and  indicates the combined algorithm.</p>
        <p>In terms of computational eficiency, the basic checker is much faster as it involves only a handful
of straightforward conditions. The Markov Model, while more computationally intensive due to its
need to calculate probabilities for sequences of characters, still operates eficiently enough to be used in
real-time gameplay within Unity. No visible delays were noticed.</p>
        <p>From the perspective of player experience, the basic checker represents easier challenge and provides

immediate and clear feedback, making it suitable for introductory or easier dificulty levels. However,
as players progress into the harder dificulties, the Markov Model brings in a new layer of challenge.
Players must think more critically about the passwords they create, contributing to both the educational
and gaming aspects of ”Lockedout”.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>7. Conclusion and Future Work</title>
      <p>The integration of a password strength checker within the ”Lockedout” game introduces a novel
approach to enhancing security awareness through gamification. Password security is a critical aspect
of digital safety, yet traditional educational methods often lack the engagement needed to make a lasting
impact. By incorporating both a basic password validation algorithm and an advanced third-order
Markov Model, this project demonstrates how gamification can overcome these limitations, ofering a
more engaging and efective learning experience.</p>
      <p>The traditional password checker in ”Lockedout” serves as a key tool for educating players on the core
principles of secure password creation, ensuring an interactive introduction to basic security concepts.
However, the inclusion of the Markov Model and blacklisted password checking adds a significant
layer of sophistication, enabling the detection of common patterns and sequences that basic algorithms
may miss. This progression not only heightens the challenge within the game but also reinforces the
necessity of unpredictable and secure passwords in real-world applications.</p>
      <p>Looking to the future, potential improvements will include the incorporation of OS Guard AI agent
which will be able to provide real-time instructions, notifications and suggestions to the player. Password
strength checkers are just part of the mechanism, and without appropriate educative prompts and tips
gameplay would not be complete.</p>
      <p>Additionally, mechanic which summarize player’s actions and explains good and bad practices in
cyber-security could further enhance the game’s educational value and overall user experience.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgment</title>
      <p>This paper was supported in part by the Video Game Development Laboratory and in part by the
Blockchain Technology Laboratory, both at Belgrade Metropolitan University, Belgrade, Serbia.
The authors have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kostić</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Saveljić</surname>
          </string-name>
          ,
          <article-title>Gamification as a tool for elevating password strength awareness</article-title>
          ,
          <source>in: Proceedings of the Fourteenth International Conference on Business Information Security BISEC'</source>
          <year>2023</year>
          , Niš, 24th
          <year>December 2023</year>
          .,
          <year>2024</year>
          , pp.
          <fpage>18</fpage>
          -
          <lpage>22</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Shepherd</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Archibald</surname>
          </string-name>
          ,
          <string-name>
            <surname>R. I. Ferguson</surname>
          </string-name>
          ,
          <article-title>Perception of risky security behaviour by users: Survey of current approaches</article-title>
          , in: Human Aspects of Information Security, Privacy, and Trust: First International Conference, HAS 2013,
          <article-title>Held as Part of HCI International 2013</article-title>
          ,
          <string-name>
            <surname>Las</surname>
            <given-names>Vegas</given-names>
          </string-name>
          ,
          <string-name>
            <surname>NV</surname>
          </string-name>
          , USA, July
          <volume>21</volume>
          -
          <issue>26</issue>
          ,
          <year>2013</year>
          . Proceedings 1, Springer,
          <year>2013</year>
          , pp.
          <fpage>176</fpage>
          -
          <lpage>185</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>G.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <article-title>On password strength: a survey and analysis</article-title>
          ,
          <source>Software Engineering, Artificial Intelligence</source>
          , Networking and Parallel/Distributed Computing (
          <year>2018</year>
          )
          <fpage>165</fpage>
          -
          <lpage>186</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S. L.</given-names>
            <surname>Pfleeger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. D.</given-names>
            <surname>Caputo</surname>
          </string-name>
          ,
          <article-title>Leveraging behavioral science to mitigate cyber security risk</article-title>
          ,
          <source>Computers &amp; security 31</source>
          (
          <year>2012</year>
          )
          <fpage>597</fpage>
          -
          <lpage>611</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Stanton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. R.</given-names>
            <surname>Stam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Mastrangelo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jolton</surname>
          </string-name>
          ,
          <article-title>Analysis of end user security behaviors</article-title>
          ,
          <source>Computers &amp; security 24</source>
          (
          <year>2005</year>
          )
          <fpage>124</fpage>
          -
          <lpage>133</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>X. D. C. D. Carnavalet</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Mannan</surname>
          </string-name>
          ,
          <article-title>A large-scale evaluation of high-impact password strength meters</article-title>
          ,
          <source>ACM Transactions on Information and System Security (TISSEC) 18</source>
          (
          <year>2015</year>
          )
          <fpage>1</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>C.</given-names>
            <surname>Castelluccia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dürmuth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Perito</surname>
          </string-name>
          ,
          <article-title>Adaptive password-strength meters from markov models</article-title>
          .,
          <source>in: NDSS</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V.</given-names>
            <surname>Taneski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kompara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Heričko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Brumen</surname>
          </string-name>
          ,
          <article-title>Strength analysis of real-life passwords using markov models</article-title>
          ,
          <source>Applied Sciences</source>
          <volume>11</volume>
          (
          <year>2021</year>
          )
          <fpage>9406</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>P.</given-names>
            <surname>Herzig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ameling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Wolf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Schill</surname>
          </string-name>
          ,
          <article-title>Implementing gamification: requirements and gamification platforms, Gamification in education and business (</article-title>
          <year>2015</year>
          )
          <fpage>431</fpage>
          -
          <lpage>450</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Scholefield</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Shepherd</surname>
          </string-name>
          ,
          <article-title>Gamification techniques for raising cyber security awareness, in: HCI for Cybersecurity, Privacy</article-title>
          and Trust: First International Conference, HCI-CPT
          <year>2019</year>
          ,
          <article-title>Held as Part of the 21st HCI International Conference</article-title>
          , HCII 2019,
          <article-title>Orlando</article-title>
          , FL, USA, July
          <volume>26</volume>
          -
          <issue>31</issue>
          ,
          <year>2019</year>
          , Proceedings 21, Springer,
          <year>2019</year>
          , pp.
          <fpage>191</fpage>
          -
          <lpage>203</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>G.</given-names>
            <surname>Fink</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Best</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Manz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Popovsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Endicott-Popovsky</surname>
          </string-name>
          ,
          <article-title>Gamification for measuring cyber security situational awareness</article-title>
          ,
          <source>in: Foundations of Augmented Cognition: 7th International Conference, AC</source>
          <year>2013</year>
          ,
          <article-title>Held as Part of HCI International 2013</article-title>
          ,
          <string-name>
            <surname>Las</surname>
            <given-names>Vegas</given-names>
          </string-name>
          ,
          <string-name>
            <surname>NV</surname>
          </string-name>
          , USA, July
          <volume>21</volume>
          -
          <issue>26</issue>
          ,
          <year>2013</year>
          . Proceedings 7, Springer,
          <year>2013</year>
          , pp.
          <fpage>656</fpage>
          -
          <lpage>665</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>I. Rief</surname>
          </string-name>
          ,
          <article-title>Systematically applying gamification to cyber security awareness trainings: A framework and case study approach</article-title>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>G.</given-names>
            <surname>Barata</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gama</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jorge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gonçalves</surname>
          </string-name>
          ,
          <article-title>Improving participation and learning with gamification</article-title>
          ,
          <source>in: Proceedings of the First International Conference on gameful design, research, and applications</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>10</fpage>
          -
          <lpage>17</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Unitiy</given-names>
            <surname>Technologies</surname>
          </string-name>
          ,
          <year>2024</year>
          . URL: https://unity.com/.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>D.</given-names>
            <surname>Miessler</surname>
          </string-name>
          , 10
          <source>million password list top 1000000</source>
          ,
          <year>2020</year>
          . URL: https://github.com/danielmiessler/ SecLists/blob/master/Passwords/Common-Credentials/10-million
          <article-title>-password-list-top-1000000</article-title>
          . txt.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Avast</surname>
          </string-name>
          , Online random password generator,
          <year>2024</year>
          . URL: https://www.avast.com/ random-password-generator#pc.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>