Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
blacklisting
biblio
Computer Vision Based Framework For Detecting Phishing Webpages
Submitted by grigby1 on Thu, 10/13/2022 - 12:16pm
tools
machine learning
Servers
pubcrawl
Human behavior
JavaScript
Browsers
blacklisting
Phishing
HTML
computer vision
Spear-phishing
biblio
Phishing Detection from URLs Using Deep Learning Approach
Submitted by grigby1 on Thu, 10/13/2022 - 12:15pm
convolution
Neural networks
pubcrawl
Human behavior
internet
deep learning
Browsers
blacklisting
Phishing
Web pages
cyber-attack detection
cyber security
glove
biblio
Towards the Detection of Phishing Attacks
Submitted by grigby1 on Thu, 10/13/2022 - 12:15pm
IP networks
pubcrawl
Human behavior
Browsers
blacklisting
Phishing
Web pages
Electronic mail
Uniform resource locators
social engineering
Anti-phishing approaches
evasion techniques
hybrid approach
Phishing types
biblio
Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning
Submitted by aekwall on Mon, 11/29/2021 - 1:59pm
Computational modeling
Data models
Perturbation methods
Training
Servers
Containers
pubcrawl
Scalability
Resiliency
Adversarial Machine Learning
data privacy
blacklisting
domain generation algorithms
Long short-term memory
signature based defense
biblio
Collaborative Cyber Attack Defense in SDN Networks using Blockchain Technology
Submitted by grigby1 on Thu, 03/04/2021 - 2:56pm
proactive defense operations
defense
defense perspectives
increases security awareness
invasive software
knowledge-sharing platform
legacy security defense mechanisms
malware campaigns
open-source permissioned blockchain platform
Peer-to-peer computing
potential attacks
proactive defense
cyber-attacks
pubcrawl
resilience
SDN
SDN networks
secure distributed model
software defined networking
sophisticated threats
tamper-proof record-keeping
Zero day attacks
zero-day
Collaborative DDoS Mitigation
Resiliency
Metrics
Human behavior
blacklisting
blockchain
blockchain application
blockchain technology
collaboration
collaborative cyber attack defense
collaborative DDoS attack mitigation
threat mitigation
Collaborative Defense
composability
Computer crime
computer network management
computer network security
contracts
Cryptography
cyber threat intelligence
cyber threat intelligence plays
cyber threat intelligence sharing
biblio
SEADer++ v2: Detecting Social Engineering Attacks using Natural Language Processing and Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 1:38pm
natural language processing
social networks potential hackers
social engineering attacks detection
social attacks
SEADer++ v2
potential attacks
natural language processing steps
future attacks
Forestry
blacklisting
social engineering
Attack detection
cyber security
security of data
Mathematical model
Libraries
internet
social networking (online)
machine learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Classification algorithms
Scalability
biblio
Malicious URL Linkage Analysis and Common Pattern Discovery
Submitted by grigby1 on Fri, 12/11/2020 - 2:35pm
Malicious URL
website
Web pages
URL
Uniform resource locators
Resiliency
resilience
real enterprise network
pubcrawl
privacy
open-source threat intelligence
Metrics
Malware Analysis
malware
malicious URL linkage analysis
blacklisting
malicious domain names
malicious domain name
malicious destinations
linkage analysis
internet
Industries
Human behavior
graph-based model
graph theory
drive-by download
Crawlers
Couplings
computer network security
business communication
biblio
Detecting Phishing Attacks Using Natural Language Processing and Machine Learning
Submitted by aekwall on Mon, 05/18/2020 - 10:53am
phishing attack detection
unsolicited e-mail
Uniform resource locators
text analysis
social engineering
Semantics
security threats
Scalability
Resiliency
pubcrawl
phishing emails
blacklisting
Phishing
natural language text
natural language processing
malicious intent detection
machine learning
learning (artificial intelligence)
inappropriate statements detection
Human behavior
Electronic mail
Computer crime
biblio
MANiC: Multi-step Assessment for Crypto-miners
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
profitability
Human Factors
malicious activities
Malicious URL
malware
Metrics
Multistep assessment
normal browser behaviour
online front-ends
Human behavior
pubcrawl
related CryptoJacking research
resilience
Resiliency
suspicious behaviour
Web Browser Security
Web sites
Web-based Threats
CPU-based mining
bitcoin
blacklisting
Browser Security
browser-hijacking
Browsers
Browsers host
composability
Compositionality
application program interfaces
Crypto-miners
Crypto-mining
crypto-mining scripts
cryptocurrencies
cryptojacking
CryptoJacking websites
Data mining
Drive-by Mining
biblio
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists
Submitted by grigby1 on Fri, 04/17/2020 - 10:44am
resilience
mobile computing
modern phishing websites
native blacklisting
Organizations
PhishFarm framework
Phishing
phishing attacks
phishing kits
pubcrawl
mobile browsers
Resiliency
security
security of data
unsolicited e-mail
Web Browser Security
Web browsers
Web sites
web-browser
diverse cloaking techniques
anti-phishing-ecosystem
blacklisting
browser blacklists
browser phishing blacklists
Browsers
Cloaking
composability
Compositionality
Computer crime
anti-phishing entities
Ecosystems
evasion techniques
HTTP request
Human behavior
Human Factors
internet
live phishing sites
Metrics
1
2
next ›
last »