Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
human factor
biblio
Tools for Investigating the Phishing Attacks Dynamics
Submitted by grigby1 on Tue, 11/26/2019 - 2:48pm
phishing attacks detection
wavelet transforms
wavelet coherence.
wavelet coherence
wavelet analysis
tools
the chaos theory
Stability analysis
pubcrawl
phishing attacks occurrence
phishing attacks dynamics
a phase portrait
Phishing
human factor
Human behavior
estimation
computer network security
Computer crime
Coherence
chaos theory
chaos
biblio
Detection of Phishing Attacks
Submitted by grigby1 on Tue, 11/26/2019 - 2:48pm
Phishing
information security
Intrusion Detection
Intrusion Detection Systems
login credentials
mail contents
malicious links
money loss
official person
identity theft
phishing attacks
phishing emails
Postal services
pubcrawl
spam mails
spam words
Uniform resource locators
unsolicited e-mail
detection problem
attachments
attacker
Bayes methods
Bayesian algorithm
Classification algorithms
communication mediums
Computer crime
cyber attack
Anti Phishing Simulator
digital simulation
e-mail
e-mails harm victims
Electronic mail
Filtering
Human behavior
human factor
biblio
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
Submitted by grigby1 on Tue, 11/26/2019 - 2:47pm
random forests
pattern classification
personal information
Phishing
phishing attack detection
Phishing Detection
phishing Web sites
pubcrawl
random forest classification
machine learning-based strategies
rough set theory
Rough sets
Training
Uniform resource locators
universal feature set
Web pages
Web sites
Fuzzy Rough Set
Computer crime
confidential information
cybercrime activities
definitive features
Electronic mail
feature extraction
Feature Selection
FRS feature selection
classifiers
fuzzy rough set feature selection
fuzzy rough set theory
fuzzy set theory
generalizable phishing detection
Human behavior
human factor
legitimate Web site
biblio
A Methodical Overview on Phishing Detection along with an Organized Way to Construct an Anti-Phishing Framework
Submitted by grigby1 on Tue, 11/26/2019 - 2:47pm
pubcrawl
machine learning
personal information
Phishing
phishing approaches
phishing attack
Phishing Detection
phishing Websites
phishy URL
internet
security and privacy
security attack
tools
Uniform resource locators
unsolicited e-mail
Web sites
website features
credit card details
Anti Phishing Working Group
Anti-phishing
Anti-Phishing framework
anti-phishing model
Banking
blacklisting
classification
Computer crime
account details
emails
feature extraction
Google
HTTPs
Human behavior
human factor
in-use anti-phishing tools
biblio
Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains
Submitted by grigby1 on Tue, 11/26/2019 - 2:42pm
application domains
Human behavior
human factor
Human Factors
Internet of Things
IoT-HarPSecA
Metrics
Pervasive Computing Security
pubcrawl
resilience
Resiliency
Scalability
security
security framework
security requirements
biblio
Secure IoT for a Pervasive Platform
Submitted by grigby1 on Tue, 11/26/2019 - 2:42pm
pubcrawl
ubiquitous computing
software elements
Software
smart communication-enable devices
Servers
security
secure IoT
secure element
Scalability
Resiliency
resilience
public key infrastructure
public key cryptography
Public key
computer architecture
pervasive systems
pervasive platform
Pervasive Computing Security
pervasive computing
pervasive applications
Metrics
Internet of Things
Human Factors
human factor
Human behavior
Hardware
end-to-end security level
computer network security
biblio
Blockchain Based Security Framework for P2P Filesharing System
Submitted by grigby1 on Tue, 11/26/2019 - 2:38pm
P2P filesharing system
Sybil attack
security
Scalability
routing table insertion attack
Routing
Resiliency
resilience
pubcrawl
Protocols
peer-to-peer network
peer-to-peer filesharing system
Peer-to-peer computing
peer to peer security
blockchain
overlay networks
Metrics
Human Factors
human factor
Human behavior
Free riding
file sharing
dynamic self-organized technology
cryptocurrencies
computer network security
collaboration
Blockchain based security framework
biblio
An Evaluation of the Security of the Bitcoin Peer-To-Peer Network
Submitted by grigby1 on Tue, 11/26/2019 - 2:38pm
Human Factors
transaction confirmation process
Software
service attacks
Security Evaluation
Scalability
Resiliency
resilience
pubcrawl
Protocols
Peer-to-peer computing
peer to peer security
P2P network
network protocol
network message exchanges
Metrics
bitcoin
human factor
Human behavior
distributed denial of service attacks
denial of service
DDoS Attacks
Data mining
Cryptographic Protocols
cryptocurrencies
computer network security
Computer crime
blockchain
Bitcoin peer-to-peer network
bitcoin mining process
bitcoin message exchanges
bitcoin core software
biblio
Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis
Submitted by grigby1 on Tue, 11/26/2019 - 2:38pm
P2P bots
Spark
security
Scalability
Resiliency
resilience
pubcrawl
Periodicity Behavior Analysis
periodicity behavior
PeerGrep
Peer-to-peer computing
peer-to-peer botnets
peer to peer security
P2P hosts
P2P communications
botnet
P2P botnet
network security
Monitoring
Metrics
IP networks
IP addresses
invasive software
Human Factors
human factor
Human behavior
feature extraction
Conferences
computer network security
Botnet detection
biblio
Blockchain: A Tale of Peer to Peer Security
Submitted by grigby1 on Tue, 11/26/2019 - 2:38pm
Metrics
virtual money
survey
smart contracts
shared public ledger
security
Scalability
Resiliency
resilience
pubcrawl
Peer-to-peer computing
Peer-To-Peer
peer to peer security
bitcoin
Internet of Things
internet
Human Factors
human factor
Human behavior
Distributed databases
decentralization
cryptocurrency
cryptocurrencies
blockchain technology
blockchain
Bitcoin cryptocurrency
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »