Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
unsolicited e-mail
biblio
A Content-Based Phishing Email Detection Method
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
information extraction
unsolicited e-mail
social engineering criteria
social engineering concepts
social engineering
semantic Web database
Semantic Web
Resource description framework
pubcrawl
phishing email
Phishing
Investment
information storage
Computer crime
Human Factors
Human behavior
fuzzy logic control algorithm
fuzzy control
Filtering
email categories
Electronic mail
Databases
database management systems
cybernetics
Creativity
content-based phishing email detection
biblio
Efficient spear-phishing threat detection using hypervisor monitor
Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
spear-phishing attack
malicious activities
malicious attachments
malware
Monitoring
PDF format structures
Portable document format
pubcrawl170109
Spear-phishing
invasive software
spear-phishing threat detection
transparent hypervisor monitor
unsolicited e-mail
URL links
user accounts
Virtual machine monitors
virtualisation
Virtualization
document handling
CIA
Cloud Computing
cloud-threat inspection appliance
commercial antivirus software
Computer crime
cyber security
cyber security threats
detection engine
antievasion sandbox
document prefiltering algorithm
Electronic mail
fake emails
hackers
hardware-assisted virtualization
hardware-assisted virtualization technology
hypervisor kernel
hypervisor monitor
biblio
A review on recent phishing attacks in Internet
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
phishing attacks
Web sites
URL
unsolicited e-mail
Uniform resource locators
textual analysis
text analysis
Tabnapping
socially engineered messages
security
pubcrawl170109
phishing Website
phishing emails
Browsers
malware code
malware
invasive software
internet
illegal activity
email messages
email classification
Electronic mail
cyber-crime
Computer crime
Companies
biblio
"Pattern classification under attack on spam filtering"
Submitted by grigby1 on Thu, 02/23/2017 - 12:26pm
privacy
unsolicited e-mail
spam filtering
spam email security evaluation
spam attack scenario
security of data
security issues
Security Evaluation
security
pubcrawl
adversarial attacks
pattern classification system
pattern classification
filtering algorithms
Filtering
Electronic mail
pubcrawl170105
Classification algorithms
adversarial classification
biblio
"Discarded hard disks ??? A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk"
Submitted by abfox on Tue, 02/14/2017 - 12:25pm
security threats
malware
Media
Organizations
pubcrawl170101
reconnaissance activities
recovered sensitive data
Security and Privacy Awareness
security controls
malicious link
sensitive-personal organizational data
social network analysis
Software
Spear-phishing
stolen storage devices
Trust management
unsolicited e-mail
e-mail credibility
background information
Cybercrime
cybercriminals
Data protection
data recovery
Digital Forensics
discarded hard disks
discarded storage devices
advanced persistent threat
Electronic mail
hard discs
Hard disks
invasive software
malicious activities
malicious actors
malicious attachment
biblio
Identity-based remote data possession checking in public clouds
Submitted by BrandonB on Wed, 05/06/2015 - 2:45pm
certificate management elimination
Cloud Computing
cloud server
Cryptographic Protocols
data outsourcing
ID-RDPC protocol
identity-based RDPC protocols
identity-based remote data possession checking protocol
PKI setting
public cloud storage
public key cryptography
public key infrastructure
spam
standard computational Diffie-Hellman problem
storage management
unsolicited e-mail
biblio
Spam Trapping System: Novel security framework to fight against spam botnets
Submitted by BrandonB on Wed, 05/06/2015 - 10:18am
prevent-then-detect approach
warfare kill zone
Unsolicited electronic mail
unsolicited e-mail
STS
static an analysis
spam trapping system
spam botnets
spam botnet detection
security framework
sandboxing principle
program diagnostics
airport check-in system
malware bot
malware
invasive software
intrusion detection system
dynamic analysis
defense-in-depth model
Cryptography
computational cost
Charge carrier processes
Airports
biblio
Combatting phishing: A holistic human approach
Submitted by BrandonB on Thu, 04/30/2015 - 1:31pm
security vulnerability
organizational aspects
Phishing
phishing security controls
security
security education
security education training and awareness
security gaps
security training
organisational aspects
social engineering
spoofed-Web sites
technological controls
technology acceptance model
Training
trusted reputation
unsolicited e-mail
fake warnings
ails
awareness programme
COBIT
Computer crime
computer science education
cyber criminals
design science principles
educational factors
agency theory
financial awards
holistic human approach
HOT elements
Human Factors
ISO
lax security behavior
Lead
« first
‹ previous
1
2
3
4
5
6