Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Postal services
biblio
Investigating the Effect of Phishing Believability on Phishing Reporting
Submitted by grigby1 on Fri, 02/03/2023 - 4:22pm
Organizations
pubcrawl
Human behavior
Correlation
Layout
Phishing
Electronic mail
controlled experiment
Postal services
reporting
biblio
E-Mail Classification Using Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 9:54am
k-means algorithm
Word2Vec algorithm
Word2Vec
Web page memberships
unsupervised training model
unsolicited e-mail
Tokenization
test phase M3 model
Skip Gram
serious communication tool
reminders
Electronic mail
e-mail classification
business correspondence
academic notices
Scalability
Unsupervised Learning
k-means
natural language processing
spam e-mails
Postal services
text classification
text analysis
pattern classification
pubcrawl
Human behavior
Resiliency
Support vector machines
Classification algorithms
biblio
Efficient Detection of Spam Messages Using OBF and CBF Blocking Techniques
Submitted by grigby1 on Mon, 02/10/2020 - 10:18am
spam detection
Picture Based Shifting
porter stemer algorithm
Postal services
Poster Stemmer algorithm
pubcrawl
Scalability
Servers
spam block mail
pattern clustering
spam detection system
spam mail-sifting system
spam message
spamming changes
unsolicited e-mail
user attacks
web applications
information filtering
Conferences
content based filter
Content based Filter (CBF)
e-mail filters
emails
Human behavior
Human Factors
Informatics
CBF blocking techniques
internet
k means clustering
mail message
Market research
Metrics
OBF
OBF blocking techniques
biblio
Spam Domain Detection Method Using Active DNS Data and E-Mail Reception Log
Submitted by grigby1 on Mon, 02/10/2020 - 10:17am
Metrics
unsolicited e-mail
Training
system monitoring
supervised learning
spoofed e-mails
SPF
spam mail
spam domain detection
spam detection
sender IP address
sender domain authentication
Scalability
pubcrawl
Postal services
active DNS
message authentication
IP networks
internet
Human Factors
Human behavior
feature extraction
Electronic mail
e-mail reception log
e-mail log analysis
DMARC
DKIM
authentication
active DNS data
biblio
Detection of Phishing Attacks
Submitted by grigby1 on Tue, 11/26/2019 - 2:48pm
Phishing
information security
Intrusion Detection
Intrusion Detection Systems
login credentials
mail contents
malicious links
money loss
official person
identity theft
phishing attacks
phishing emails
Postal services
pubcrawl
spam mails
spam words
Uniform resource locators
unsolicited e-mail
detection problem
attachments
attacker
Bayes methods
Bayesian algorithm
Classification algorithms
communication mediums
Computer crime
cyber attack
Anti Phishing Simulator
digital simulation
e-mail
e-mails harm victims
Electronic mail
Filtering
Human behavior
human factor
biblio
Detection of Spam E-mails with Machine Learning Methods
Submitted by aekwall on Mon, 02/25/2019 - 10:42am
naïve Bayes classifier
vector space model
Unsolicited electronic mail
unsolicited e-mail
spam filtering
spam e-mails
spam detection
security of data
Scalability
pubcrawl
Postal services
pattern classification
offensive content
Analytical models
Metrics
machine learning methods
machine learning
learning (artificial intelligence)
internet
Human behavior
Filtering
e-mail filtering
e-mail communication
content information
Bayes methods
biblio
Detecting phishing attacks from URL by using NLP techniques
Submitted by K_Hooper on Wed, 01/10/2018 - 10:15am
natural language processing
URL
unsolicited e-mail
Uniform resource locators
security of data
Scalability
Resiliency
random forest algorithm
pubcrawl
Postal services
phishing attack analysis report
phishing attack
NLP
natural language processing techniques
Computer crime
Nanoelectromechanical systems
Markov processes
machine learning-based system
machine learning
learning (artificial intelligence)
Law
Internet users
internet
Human behavior
cyber security
cyber attack threats
Cyber Attack Detection
biblio
Detection of compromised email accounts used for spamming in correlation with origin-destination delivery notification extracted from metadata
Submitted by grigby1 on Wed, 12/20/2017 - 12:08pm
ODDN
Unsolicited electronic mail
unsolicited e-mail
spam messages
spam
Servers
remote SMTP server
pubcrawl
Postal services
phishing messages
Phishing
pattern classification
origin-destination delivery notification extracted
Origin-Destination Delivery Notification
authentication
metadata
IP networks
incoming junk mail detection
Human Factors
Human behavior
hacked
geographical origin
encrypted phishing
delivery status notification
data privacy
compromised email account detection
compromised email account
biblio
Insider Threat Detection Based on Deep Belief Network Feature Representation
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
Insider Threat Detection
Training
Resiliency
pubcrawl
Postal services
policy-based governance
one-class SVM
Metrics
Learning systems
Insider Threats
collaboration
Information systems
Human Factors
Human behavior
feature representation
feature extraction
Electronic mail
Deep Belief Network
Data models
biblio
A proven method for identifying security gaps in international postal and transportation critical infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 1:24pm
supply chain management
resilince management
risk analysis
security
security gap identification
security risk mitigation
shipping processing facilities
ships
Standards organizations
pubcrawl170112
surface to-air missile system
Transportation
transportation critical infrastructure security
transportation processing facilities
United States Postal Inspection Service
UPU standards
USPIS
worldwide commerce
international scale
critical transportation services
field instrument
global supply chain
Inspection
Instruments
international community
international mail processing centers
international postal infrastructure
critical infrastructures
military aircraft
missiles
National security
Organizations
physical security
physical security assessment method
Postal services
1
2
next ›
last »