Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
unsolicited e-mail
biblio
Malicious browser extensions: A growing threat: A case study on Google Chrome: Ongoing work in progress
Submitted by grigby1 on Wed, 01/16/2019 - 2:32pm
Servers
online front-ends
party developers
payment frauds
Phishing
popular browser
pubcrawl
Resiliency
security of data
Metrics
spying
traditional functionalities
Uniform resource locators
unsolicited e-mail
Videos
Web Browser Security
Web pages
affiliate fraud
malicious browser extensions
malicious browser extension
internet
Human behavior
Google Chrome
fraud
Electronic mail
current browsers
Computer crime
Compositionality
Browsers
browser extension platform
browser extension
attacks
attack possibilities
biblio
Categorical Classification and Deletion of Spam Images on Smartphones Using Image Processing and Machine Learning
Submitted by grigby1 on Wed, 09/12/2018 - 11:18am
machine learning
whatsapp
unsolicited e-mail
spam images
social networking (online)
Smartphones
smart phones
Scalability
pubcrawl
privacy
Optical character recognition software
mobile device
mobile computing
media exchange
manual deletion
categorical classification
learning (artificial intelligence)
Image Processing
image classification
Histograms
feature extraction
Facebook
face recognition
Face
exponential rate
Electronic mail
data deletion
communication apps
classification
categorical deletion
biblio
Identifying Email Threats Using Predictive Analysis
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
Policy
URL
unsolicited e-mail
unseen emails
Uniform resource locators
targeted attacks
Support vector machines
static analysis
sandboxing
Random Forest
pubcrawl
Predictive models
predictive analysis approach
Policy-Governed systems
Policy-Governed Secure Collaboration
Analytical models
malware attachment
malware
malicious emails
machine learning model
machine learning algorithms
learning (artificial intelligence)
invasive software
feature extraction
email threat identification
Electronic mail
Computer crime
composability
collaboration
attackers
biblio
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs
Submitted by grigby1 on Tue, 05/01/2018 - 11:22am
Phishing
unsolicited e-mail
top-level domains security
top-level domains
TLDs security
statistical regression model
software metrics
Servers
security performance measurement
security
reputation metrics design
reputation metrics
regression analysis
phishing datasets
Computer crime
Measurement
malware datasets
malware
IP networks
invasive software
internet
intermediary incentives
Feeds
Ecosystems
domain name system
domain abuse
DNS ecosystem
cybercriminals
biblio
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs
Submitted by grigby1 on Mon, 04/30/2018 - 3:09pm
Phishing
unsolicited e-mail
top-level domains security
top-level domains
TLDs security
statistical regression model
software metrics
Servers
security performance measurement
Security Metrics
security
reputation metrics design
reputation metrics
regression analysis
pubcrawl
phishing datasets
Computer crime
Metrics
Measurement
malware datasets
malware
IP networks
invasive software
internet
intermediary incentives
Feeds
Ecosystems
domain name system
domain abuse
DNS ecosystem
cybercriminals
biblio
Early Detection of In-the-Wild Botnet Attacks by Exploiting Network Communication Uniformity: An Empirical Study
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
Resiliency
multiple infected machines
network behaviour
network communication uniformity
outgoing bot attacks
port scanning attacks
pubcrawl
real-world spamming
resilience
Monitoring
Servers
synchronised behaviour
Synchronization
trojan horse detection
Trojan horses
unsolicited e-mail
widespread infection
botnet communication
malicious behaviour
large-scale malware propagation campaigns
invasive software
in-the-wild botnet attacks
early infection
early detection
distributed attack
cyber physical systems
computer network security
Computer crime
composability
command botnets
botnet-infected machines
botnet traffic
botnet controllers
biblio
Accurate Detection of Automatically Spun Content via Stylometric Analysis
Submitted by grigby1 on Mon, 03/19/2018 - 1:37pm
spam
unsolicited e-mail
text spinning software
text spinning
text spinner dictionary
text analysis
stylometry
stylometric artifacts
stylometric analysis
spun documents
spun content detection
Spinning
spammers
content spinning techniques
Software
search engines
pubcrawl
plagiarism detector evasion
plagiarism detection
Plagiarism
Metrics
Human behavior
Frequency measurement
feature extraction
Dictionaries
biblio
Detecting phishing attacks from URL by using NLP techniques
Submitted by K_Hooper on Wed, 01/10/2018 - 11:15am
natural language processing
URL
unsolicited e-mail
Uniform resource locators
security of data
Scalability
Resiliency
random forest algorithm
pubcrawl
Postal services
phishing attack analysis report
phishing attack
NLP
natural language processing techniques
Computer crime
Nanoelectromechanical systems
Markov processes
machine learning-based system
machine learning
learning (artificial intelligence)
Law
Internet users
internet
Human behavior
cyber security
cyber attack threats
Cyber Attack Detection
biblio
Random forest explorations for URL classification
Submitted by grigby1 on Wed, 12/20/2017 - 1:08pm
Phishing
Web sites
URL classification
unsolicited e-mail
Uniform resource locators
Training
testing
Random forest explorations
Radio frequency
pubcrawl
phishing Websites
blacklisting
pattern classification
machine learning algorithms
learning (artificial intelligence)
internet
Human Factors
Human behavior
feature extraction
Computer crime
common defence users
Classification algorithms
biblio
Detection of compromised email accounts used for spamming in correlation with origin-destination delivery notification extracted from metadata
Submitted by grigby1 on Wed, 12/20/2017 - 1:08pm
ODDN
Unsolicited electronic mail
unsolicited e-mail
spam messages
spam
Servers
remote SMTP server
pubcrawl
Postal services
phishing messages
Phishing
pattern classification
origin-destination delivery notification extracted
Origin-Destination Delivery Notification
authentication
metadata
IP networks
incoming junk mail detection
Human Factors
Human behavior
hacked
geographical origin
encrypted phishing
delivery status notification
data privacy
compromised email account detection
compromised email account
« first
‹ previous
1
2
3
4
5
6
next ›
last »