Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
unsolicited e-mail
biblio
Compositional Data Analysis with PLS-DA and Security Applications
Submitted by aekwall on Mon, 11/09/2020 - 1:13pm
Euclidean distance
Information Reuse and Security
spam filters
PLS-DA algorithm
partial least squares discriminant analysis
Least squares approximations
isometric log ratio transformation
information system security applications
ILR
data-based power transformation
data science models
compositional vectors
compositional data analysis
Compositional data
Aitchison transformation
Intrusion Detection
Loading
Compositionality
statistical analysis
data analysis
Mathematical model
spam filtering
unsolicited e-mail
standards
pubcrawl
Resiliency
Electronic mail
Data models
security of data
biblio
Word Embedding Method of SMS Messages for Spam Message Filtering
Submitted by aekwall on Mon, 05/18/2020 - 10:55am
SMS Filtering
machine learning method
classification methods
binary classification
CBOW
deep learning method
feedforward neural network
Feedforward neural networks
popular machine learning method
deep learning
SMS messages
spam message filtering
SVM light
word embedding
word embedding method
word embedding technique
Word Vector
security of data
feedforward neural nets
natural language processing
information filtering
Filtering
electronic messaging
SVM
unsolicited e-mail
pattern classification
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
Support vector machines
Scalability
biblio
E-Mail Classification Using Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 10:54am
k-means algorithm
Word2Vec algorithm
Word2Vec
Web page memberships
unsupervised training model
unsolicited e-mail
Tokenization
test phase M3 model
Skip Gram
serious communication tool
reminders
Electronic mail
e-mail classification
business correspondence
academic notices
Scalability
Unsupervised Learning
k-means
natural language processing
spam e-mails
Postal services
text classification
text analysis
pattern classification
pubcrawl
Human behavior
Resiliency
Support vector machines
Classification algorithms
biblio
Detecting Phishing Attacks Using Natural Language Processing and Machine Learning
Submitted by aekwall on Mon, 05/18/2020 - 10:53am
phishing attack detection
unsolicited e-mail
Uniform resource locators
text analysis
social engineering
Semantics
security threats
Scalability
Resiliency
pubcrawl
phishing emails
blacklisting
Phishing
natural language text
natural language processing
malicious intent detection
machine learning
learning (artificial intelligence)
inappropriate statements detection
Human behavior
Electronic mail
Computer crime
biblio
Neural Network Spam Filtering Technology
Submitted by grigby1 on Fri, 05/08/2020 - 3:01pm
neural nets
unsolicited e-mail
Training
spam filtering
security of data
Resiliency
resilience
pubcrawl
policy-based governance
pattern classification
neural network technology development
neural network spam filtering technology
Neural Network Security
neural network
artificial neural network model
Metrics
information security
information filtering
Filtering
e-mail spam filtering
e-mail messages filtration
e-mail messages classification
databases knowledge discovery technology
Data mining
collaboration
Biological neural networks
Artificial Neural Networks
biblio
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists
Submitted by grigby1 on Fri, 04/17/2020 - 10:44am
resilience
mobile computing
modern phishing websites
native blacklisting
Organizations
PhishFarm framework
Phishing
phishing attacks
phishing kits
pubcrawl
mobile browsers
Resiliency
security
security of data
unsolicited e-mail
Web Browser Security
Web browsers
Web sites
web-browser
diverse cloaking techniques
anti-phishing-ecosystem
blacklisting
browser blacklists
browser phishing blacklists
Browsers
Cloaking
composability
Compositionality
Computer crime
anti-phishing entities
Ecosystems
evasion techniques
HTTP request
Human behavior
Human Factors
internet
live phishing sites
Metrics
biblio
Phishing URL Detection Via Capsule-Based Neural Network
Submitted by grigby1 on Fri, 04/10/2020 - 12:37pm
Neural networks
Web sites
URL Detection
unsolicited e-mail
Uniform resource locators
uniform resource locator
substantial manual feature engineering
social engineering
sensitive information
pubcrawl
phishing Website
phishing detection method
Phishing Detection
phishing criminals
phishing attacks
Phishing
capsule network
machine learning
Human Factors
Human behavior
Heuristic algorithms
feature representations
feature extraction
deep learning
cyber security
cyber attack
critical threat
convolutional neural nets
convolutional layer
convolution
Computer crime
capsule-based neural network
biblio
Classifying Phishing Email Using Machine Learning and Deep Learning
Submitted by grigby1 on Fri, 04/10/2020 - 12:36pm
one-hot encoding
Web sites
unsolicited e-mail
text analysis
Support vector machines
Semantics
pubcrawl
phishing emails
phishing email
Phishing
pattern classification
Computer crime
machine learning
learning (artificial intelligence)
Human Factors
Human behavior
encoding
email text
Electronic mail
deep semantic analysis
deep learning
biblio
Measuring the Information Security Awareness Level of Government Employees Through Phishing Assessment
Submitted by grigby1 on Fri, 04/10/2020 - 12:36pm
information security awareness
unsolicited e-mail
pubcrawl
phishing simulation
phishing assessment
Phishing
Personnel
password
knowledge approach
knowledge and behavioral approach
information security instruments
information security awareness level
behavior approach
Indonesia
Human Factors
Human behavior
government information security
government employees
government data processing
Government
employees information security awareness
Directorate General of ABC
DG ABC employees
Computer crime
biblio
WC-PAD: Web Crawling based Phishing Attack Detection
Submitted by aekwall on Mon, 03/09/2020 - 11:12am
Web crawler
nonphishing websites
phase attack detection
phishing attack detector
phishing detection approach
phishing occurrence
phishing Websites
WC-PAD
web content
Heuristics
Web crawling
Web traffics
Zero-day phishing
zero-day phishing attack detection
zero-day phishing website attacks
Security Heuristics
predictability
IP networks
government websites
cloud storage hosting sites
attackers
blacklisting
Law
Uniform resource locators
Phishing
unsolicited e-mail
Web sites
Crawlers
Computer crime
pubcrawl
Resiliency
feature extraction
Scalability
« first
‹ previous
1
2
3
4
5
6
next ›
last »