Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
phishing attacks
biblio
Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
Human Factors
Web sites
user interface support
transport protocols
security
representative Webpage
pubcrawl
psychology
phishing Websites
phishing detection scenario
phishing attacks
Phishing
Knowledge engineering
ACT-R cognitive behaviour architecture model
human detection
human behaviour
Human behavior
HTTPS padlock security indicator
Decision Making
computer science
computer network security
computer model
Computer crime
computer architecture
Computational modeling
biblio
Phishing detection: A recent intelligent machine learning comparison based on models content and features
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
pubcrawl
Phishing
phishing attacks
phishing datasets
Phishing Detection
phishing detection rate
Predictive Metrics
Predictive models
predictive security metrics
online community
security
tools
Training
Trusted Computing
trusted Websites
Web sites
Web Threat
World Wide Web
Human behavior
Artificial Neural Networks
Classification algorithms
Computer crime
computer security
data analysis
Decision trees
fake Websites
financial assets
anti-phishing tools
Human Factors
intelligent machine learning comparison
internet
learning (artificial intelligence)
machine learning
ML predictive models
online attack
biblio
A review on recent phishing attacks in Internet
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
phishing attacks
Web sites
URL
unsolicited e-mail
Uniform resource locators
textual analysis
text analysis
Tabnapping
socially engineered messages
security
pubcrawl170109
phishing Website
phishing emails
Browsers
malware code
malware
invasive software
internet
illegal activity
email messages
email classification
Electronic mail
cyber-crime
Computer crime
Companies
file
Journal_of_CyberBehavior_Submission_07_29_15.docx
Submitted by cmayhorn on Tue, 10/06/2015 - 1:55pm
Human Factors
phishing attacks
psychology
social engineering
biblio
Will the “Phisher-men” Reel you in? Assessing Individual Differences in a Phishing Detection Task
Submitted by cmayhorn on Tue, 10/06/2015 - 1:55pm
Human Factors
phishing attacks
psychology
social engineering
biblio
Data-centric phishing detection based on transparent virtualization technologies
Submitted by BrandonB on Thu, 04/30/2015 - 1:47pm
human perceptual similarity
antiphishing solution
Browsers
cloud
Cloud Computing
color-based fingerprint extraction
color-based fingerprint filtering
color-based fingerprint scaling
component isolation
computer architecture
Computer crime
Data mining
data-centric phishing detection
Detectors
Web sites
Image color analysis
malware
man-in-the-browser attack
MitB attack
online front-ends
phishing attacks
spoofed Web pages
transparent virtualization technologies
virtual machines
virtualisation
VM introspection
VMI
Web pages
« first
‹ previous
1
2