Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
phishing attack
biblio
V-CRYPT: A Secure Visual Cryptography System
Submitted by aekwall on Fri, 04/01/2022 - 2:07pm
Predictive Metrics
Scientific Computing Security
voting
visual cryptography
phishing attack
Hacker
election
cryptographic techniques
scientific computing
information management
Image Processing
Compositionality
Complexity theory
Resiliency
pubcrawl
encryption
data privacy
visualization
security
biblio
A Review of Detection Methodologies for Quick Response code Phishing Attacks
Submitted by grigby1 on Tue, 08/31/2021 - 12:58pm
feature extraction
malware
password
Phishing
phishing attack
pubcrawl
QR codes
quick response code
resilience
Resiliency
security
tools
Uniform resource locators
usability
username
biblio
Detection of Phishing Websites using Machine Learning
Submitted by grigby1 on Thu, 05/20/2021 - 12:32pm
pubcrawl
Web Browser Security
Videos
Uniform resource locators
social networking (online)
Semantics
Semantic analysis methods
Resiliency
resilience
Browsers
phishing attack
Phishing
Metrics
machine learning
Human behavior
Electronic mail
database
Compositionality
biblio
Phishing Attack Detection using Machine Learning Classification Techniques
Submitted by grigby1 on Thu, 03/04/2021 - 2:57pm
Metrics
Zero day attacks
Uniform resource locators
Training
Resiliency
resilience
pubcrawl
phishing attack detection
phishing attack
Phishing
Artificial Intelligence
machine learning
Logistics
defense
Decision Tree
Conferences
computer science
composability
Classification algorithms
biblio
An Analytical Study on Cross-Site Scripting
Submitted by grigby1 on Wed, 02/10/2021 - 1:20pm
browser side script
Cross Site Scripting
XSS vulnerabilities
XSS attack
Web application
symantic states
Persistent XSS attack
Non-persistent XSS attack
input validation
injection
fake malicious website
security of data
cross-site scripting
malicious scripts
phishing attack
Web sites
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
Hardware-Independent Authentication Scheme Using Intelligent Captcha Technique
Submitted by grigby1 on Fri, 09/11/2020 - 11:46am
internet
streaming bots attack
Streaming bots
Servers
security attacks
security attack
screenlogger
replay attack
pubcrawl
phishing attack
password-guessing attack
password
one time password
message authentication
keylogger
authentication
Intelligent captcha technique
Intelligent Authentication Scheme
Human behavior
hardware-independent Authentication Scheme
Hardware
denial of service
Cryptography
Cryptographic Protocols
computer network security
Computer crime
composability
Cloud Computing
captchas
CAPTCHA
biblio
Building Confidence not to be Phished Through a Gamified Approach: Conceptualising User's Self-Efficacy in Phishing Threat Avoidance Behaviour
Submitted by grigby1 on Fri, 04/10/2020 - 12:36pm
observational knowledge
user self-efficacy
Training
tools
Threat avoidance motivation and behaviour
threat avoidance motivation
structural knowledge
social cognitive theory
Self-Efficacy
pubcrawl
phishing threat prevention behaviour
phishing threat avoidance behaviour
phishing attacks
phishing attack
Phishing
online identity theft attack
Human Behavior and Cybersecurity
knowledge attributes
Knowledge
internet
Human Factors
Human behavior
heuristic knowledge
gaming prototype
gamified approach
Gamification/Gamified approach
Games
Electronic mail
Computers
computer games
Computer crime
cognition
biblio
A Methodical Overview on Phishing Detection along with an Organized Way to Construct an Anti-Phishing Framework
Submitted by grigby1 on Tue, 11/26/2019 - 3:47pm
pubcrawl
machine learning
personal information
Phishing
phishing approaches
phishing attack
Phishing Detection
phishing Websites
phishy URL
internet
security and privacy
security attack
tools
Uniform resource locators
unsolicited e-mail
Web sites
website features
credit card details
Anti Phishing Working Group
Anti-phishing
Anti-Phishing framework
anti-phishing model
Banking
blacklisting
classification
Computer crime
account details
emails
feature extraction
Google
HTTPs
Human behavior
human factor
in-use anti-phishing tools
biblio
Detecting phishing attacks from URL by using NLP techniques
Submitted by K_Hooper on Wed, 01/10/2018 - 11:15am
natural language processing
URL
unsolicited e-mail
Uniform resource locators
security of data
Scalability
Resiliency
random forest algorithm
pubcrawl
Postal services
phishing attack analysis report
phishing attack
NLP
natural language processing techniques
Computer crime
Nanoelectromechanical systems
Markov processes
machine learning-based system
machine learning
learning (artificial intelligence)
Law
Internet users
internet
Human behavior
cyber security
cyber attack threats
Cyber Attack Detection
biblio
Challenges of Deploying PKI Based Client Digital Certification
Submitted by grigby1 on Mon, 04/24/2017 - 11:45am
digital certification
Human behavior
Phishing
phishing attack
pubcrawl
public key infrastructure (pki)
service development & management
user authentication
1
2
3
next ›
last »