Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
phishing attacks
biblio
Comparative Study of Classification Algorithms for Website Phishing Detection on Multiple Datasets
Submitted by grigby1 on Fri, 02/03/2023 - 5:24pm
Computer hacking
information security
machine learning algorithms
Support vector machines
cyber security
Neural networks
pubcrawl
Human behavior
Artificial Intelligence
Classification algorithms
Phishing
Seminars
Phishing Detection
phishing attacks
Phishing Classification
biblio
A lightweight machine learning based security framework for detecting phishing attacks
Submitted by grigby1 on Wed, 10/12/2022 - 2:37pm
phishing attacks
Uniform resource locators
UNB dataset2
Transforms
SVM
security
real-time systems
Random Forest
pubcrawl
feature extraction
Phishing
neural network
machine learning
logistic regression
KNN
kaggle dataset1
Human behavior
biblio
XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in Universities
Submitted by aekwall on Mon, 09/28/2020 - 12:34pm
attack vector
Cross Site Scripting
XSStudent
URL
universities
phishing attacks
instant access
direct access
Cross-site Scripting Attacks
controlled attack
Beef software
BeEF
Scalability
Educational institutions
JavaScript code
XSS
QR code
Java
internet
Computer crime
pubcrawl
Human behavior
Resiliency
biblio
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists
Submitted by grigby1 on Fri, 04/17/2020 - 10:44am
resilience
mobile computing
modern phishing websites
native blacklisting
Organizations
PhishFarm framework
Phishing
phishing attacks
phishing kits
pubcrawl
mobile browsers
Resiliency
security
security of data
unsolicited e-mail
Web Browser Security
Web browsers
Web sites
web-browser
diverse cloaking techniques
anti-phishing-ecosystem
blacklisting
browser blacklists
browser phishing blacklists
Browsers
Cloaking
composability
Compositionality
Computer crime
anti-phishing entities
Ecosystems
evasion techniques
HTTP request
Human behavior
Human Factors
internet
live phishing sites
Metrics
biblio
Phishing URL Detection Via Capsule-Based Neural Network
Submitted by grigby1 on Fri, 04/10/2020 - 12:37pm
Neural networks
Web sites
URL Detection
unsolicited e-mail
Uniform resource locators
uniform resource locator
substantial manual feature engineering
social engineering
sensitive information
pubcrawl
phishing Website
phishing detection method
Phishing Detection
phishing criminals
phishing attacks
Phishing
capsule network
machine learning
Human Factors
Human behavior
Heuristic algorithms
feature representations
feature extraction
deep learning
cyber security
cyber attack
critical threat
convolutional neural nets
convolutional layer
convolution
Computer crime
capsule-based neural network
biblio
Building Confidence not to be Phished Through a Gamified Approach: Conceptualising User's Self-Efficacy in Phishing Threat Avoidance Behaviour
Submitted by grigby1 on Fri, 04/10/2020 - 12:36pm
observational knowledge
user self-efficacy
Training
tools
Threat avoidance motivation and behaviour
threat avoidance motivation
structural knowledge
social cognitive theory
Self-Efficacy
pubcrawl
phishing threat prevention behaviour
phishing threat avoidance behaviour
phishing attacks
phishing attack
Phishing
online identity theft attack
Human Behavior and Cybersecurity
knowledge attributes
Knowledge
internet
Human Factors
Human behavior
heuristic knowledge
gaming prototype
gamified approach
Gamification/Gamified approach
Games
Electronic mail
Computers
computer games
Computer crime
cognition
biblio
A Machine Learning Approach for URL Based Web Phishing Using Fuzzy Logic as Classifier
Submitted by grigby1 on Fri, 04/10/2020 - 12:35pm
learning (artificial intelligence)
Web sites
Web Mining
URL based Web phishing
Uniform resource locators
security of data
pubcrawl
phishing URL
phishing site
Phishing Detection
phishing attacks
Phishing
pattern classification
machine learning
classifier
internet
Human Factors
Human behavior
fuzzy logic classifier
Fuzzy logic
financial information
feature extraction
Databases
Data mining
credential information
Conferences
Computer crime
biblio
Tools and Techniques for Improving Cyber Situational Awareness of Targeted Phishing Attacks
Submitted by grigby1 on Mon, 02/17/2020 - 5:17pm
resilience
visualisation tools
visualisation
user experience
unsolicited e-mail
unauthorised access
targeted phishing campaigns
targeted phishing attacks
situational awareness
Security Awareness
Resiliency
authorisation
pubcrawl
phishing attacks
Phishing
Metrics
internet
information security
data visualisation
cyber situational awareness
Computer crime
composability
biblio
Detection of Phishing Attacks
Submitted by grigby1 on Tue, 11/26/2019 - 3:48pm
Phishing
information security
Intrusion Detection
Intrusion Detection Systems
login credentials
mail contents
malicious links
money loss
official person
identity theft
phishing attacks
phishing emails
Postal services
pubcrawl
spam mails
spam words
Uniform resource locators
unsolicited e-mail
detection problem
attachments
attacker
Bayes methods
Bayesian algorithm
Classification algorithms
communication mediums
Computer crime
cyber attack
Anti Phishing Simulator
digital simulation
e-mail
e-mails harm victims
Electronic mail
Filtering
Human behavior
human factor
biblio
Demonstrating Different Phishing Attacks Using Fuzzy Logic
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
Metrics
Web sites
unsolicited e-mail
Uniform resource locators
security of data
security
Resiliency
resilience
pubcrawl
phishing sites
Phishing Detection
phishing attacks
Phishing
pagerank
online banking passwords
bank account details
Membership functions
malicious website
legitimate websites
indexing
global security
Fuzzy logic
fraudulent websites
Fraudulent
Electronic mail
Defuzzification
Data mining
Computer crime
Classification algorithms
Bars
1
2
next ›
last »