Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Spear-phishing
biblio
Computer Vision Based Framework For Detecting Phishing Webpages
Submitted by grigby1 on Thu, 10/13/2022 - 12:16pm
tools
machine learning
Servers
pubcrawl
Human behavior
JavaScript
Browsers
blacklisting
Phishing
HTML
computer vision
Spear-phishing
biblio
Dimensions of ‘Socio’ Vulnerabilities of Advanced Persistent Threats
Submitted by aekwall on Mon, 01/20/2020 - 12:04pm
multistage attacks
Zero Day Attacks and Defense
user vulnerabilities
User behavior
technical security
system weaknesses
Spear-phishing
socio-technical vulnerabilities
socio-technical countermeasures
socio vulnerabilities dimension
socio factors
organizational management
nontechnical vulnerabilities
near zero-day malware
invasive software
internetworked computer users
inadequate cyber defenses
environmental factors
APT threats
APT attacks
advanced persistent threats (apt)
advanced persistent threats
Predictive Metrics
organisational aspects
composability
pubcrawl
Resiliency
biblio
An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks
Submitted by grigby1 on Wed, 12/20/2017 - 1:08pm
Phishing
zero-day semantic social engineering attack detection
Zero day attacks
user deception threat
threat detection
technical security countermeasures
Spear-phishing
social engineering
Semantics
semantic social engineering attacks
semantic attacks
security measures
security
Reliability
pubcrawl
Predictive models
application spoofing
multimedia masquerading
machine learning
learning (artificial intelligence)
information security scenarios
Human-as-a-Sensor
human-as-a-security-sensor paradigm
Human Factors
Human behavior
feature extraction
Electronic mail
defense
cyber security
Computer crime
Browsers
biblio
Social Engineering for Security Attacks
Submitted by grigby1 on Tue, 09/05/2017 - 1:43pm
advance persistent threat (APT)
composability
Metrics
network accountability
pubcrawl
Resiliency
social engineering
Social Network Security
Spear-phishing
biblio
Efficient spear-phishing threat detection using hypervisor monitor
Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
spear-phishing attack
malicious activities
malicious attachments
malware
Monitoring
PDF format structures
Portable document format
pubcrawl170109
Spear-phishing
invasive software
spear-phishing threat detection
transparent hypervisor monitor
unsolicited e-mail
URL links
user accounts
Virtual machine monitors
virtualisation
Virtualization
document handling
CIA
Cloud Computing
cloud-threat inspection appliance
commercial antivirus software
Computer crime
cyber security
cyber security threats
detection engine
antievasion sandbox
document prefiltering algorithm
Electronic mail
fake emails
hackers
hardware-assisted virtualization
hardware-assisted virtualization technology
hypervisor kernel
hypervisor monitor
biblio
"Discarded hard disks ??? A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk"
Submitted by abfox on Tue, 02/14/2017 - 12:25pm
security threats
malware
Media
Organizations
pubcrawl170101
reconnaissance activities
recovered sensitive data
Security and Privacy Awareness
security controls
malicious link
sensitive-personal organizational data
social network analysis
Software
Spear-phishing
stolen storage devices
Trust management
unsolicited e-mail
e-mail credibility
background information
Cybercrime
cybercriminals
Data protection
data recovery
Digital Forensics
discarded hard disks
discarded storage devices
advanced persistent threat
Electronic mail
hard discs
Hard disks
invasive software
malicious activities
malicious actors
malicious attachment