Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Email
biblio
Attacks and vulnerability analysis of e-mail as a password reset point
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
e-mail servers
brute force attacks
Vulnerability Analysis
social media
Social engineering attack
self-service password reset point
security questions
public knowledge attainable
personal Email account
Password Reset
Mobile handsets
mobile devices
middle attack
Email
authorisation
Brute-force Attack
Computer hacking
policy-based governance
Human Factors
Security analysis
password
Electronic mail
emails
collaboration
pubcrawl
internet
Protocols
biblio
Indigenous Network Monitoring System
Submitted by grigby1 on Fri, 05/15/2020 - 11:58am
real-time systems
military communication
military reconnaissance
miniature preset codes
Monitoring
NavIC control center
Network reconnaissance
NMS
offline link analysis plot
Protocols
pubcrawl
real-time network monitoring
Lucknow
resilience
Resiliency
satellite navigation
Scalability
security
Simple Network Management Protocol
SMS alert
SMS alert and Security
snmp
SNMP comprise security risks
strategic necessity
GUI based real-time link status
command and control systems
communication link performance explication
computer network management
Decision Making
Electronic mail
electronic messaging
Email
external network satellite launch vehicle
Geo-orbit
graphical user interfaces
GUI
Bandwidth
ICMP
in-house network monitoring system
Inc
indigenous navigation system
indigenous Network monitoring system
inertial navigation
internet
Internet control message protocol based link monitoring
ISTRAC Launch network
ISTRAC network
link statistics
biblio
Why Joanie Can Encrypt: Easy Email Encryption with Easy Key Management
Submitted by grigby1 on Tue, 01/21/2020 - 11:54am
Applied cryptography
Compositionality
Email
encryption audits
IMAP
key management
Metrics
PGP
pubcrawl
resilience
Resiliency
S/MIME
biblio
A Decision Matrix Model to Identify and Evaluate APT Vulnerabilities at the User Plane
Submitted by grigby1 on Fri, 03/15/2019 - 11:52am
Mobile handsets
Workstations
user plane
threat vectors
threat attributes
threat
Spear Phishing
security
pubcrawl
privacy
Phishing
Organizations
organizational user
organizational information systems
multiple APT threat vector scenarios
advanced persistent threat vectors
Metrics
malware prevention
malicious APT vector
invasive software
genuine communication
fraudulent communication
Email
Electronic mail
cyber-security defensive mechanisms
Computer crime
APT vulnerabilities
APT threat vector
APT decision matrix model
APT
biblio
Enhancing the Naive Bayes Spam Filter Through Intelligent Text Modification Detection
Submitted by aekwall on Mon, 02/25/2019 - 11:42am
spam filter
pubcrawl
Python algorithm
Scalability
social networks
spam
spam classification
spam detection
spam emails
pattern classification
spam score
Spamassassin
testing
text analysis
text classification
text modifications
unsolicited e-mail
Unsolicited electronic mail
intelligent text modification detection
Bayes Spam Filter
Bayesian Poisoning
computer security
e-mail filters
Email
email communication
feature extraction
Human behavior
Bayes methods
Internet based information exchange venues
learning (artificial intelligence)
machine learning
machine learning algorithm
machine learning algorithms
Metrics
naïve Bayes classifier
Naive Bayes Spam Filter
biblio
The Persuasive Phish: Examining the Social Psychological Principles Hidden in Phishing Emails
Submitted by grigby1 on Mon, 04/24/2017 - 11:44am
Email
Human behavior
persuasion
Phishing
phishing attack
pubcrawl
security
social engineering
file
p126-zielinska.pdf
Submitted by drwright on Fri, 07/01/2016 - 1:34pm
Email
persuasion
Phishing
security
social engineering
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
biblio
The Persuasive Phish: Examining the Social Psychological Principles Hidden in Phishing Emails
Submitted by drwright on Fri, 07/01/2016 - 1:34pm
Email
persuasion
Phishing
security
social engineering
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
biblio
Learning to predict subject-line opens for large-scale email marketing
Submitted by BrandonB on Mon, 05/04/2015 - 2:24pm
marketing data processing
Weight measurement
subject-line open rate prediction learning
subject-line keywords
subject line syntax
subject line performance
subject
random forest based model training
Predictive models
Postal services
performance prediction accuracy improvement
open e-mail rates
Accuracy
learning (artificial intelligence)
learning
large-scale e-mail marketing
human editors
feature extraction
Email
Electronic mail
deals
Business
attribution scoring iterative method
biblio
A confident email system based on a new correspondence model
Submitted by BrandonB on Thu, 04/30/2015 - 1:47pm
internet
Context
Context modeling
correspondence
correspondence model
Electronic mail
Email
email security
email sender context
email service
email system policy
Human Factors
confident email system
mobile devices
Policy
Postal services
Protocols
security
security of data
trust
Trusted Computing
trusted email system
Confidence