Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
blacklisting
biblio
An Adaptive Machine Learning Based Approach for Phishing Detection Using Hybrid Features
Submitted by grigby1 on Fri, 04/10/2020 - 12:36pm
machine learning
World Wide Web
Webpages source code
Web threats
Web sites
web security
URLs
Uniform resource locators
reliable detection system
real-time systems
pubcrawl
phishing Websites
Phishing Detection
phishing attackers
Phishing
adaptive machine learning based approach
Learning Classifier System
learning (artificial intelligence)
internet
intelligent phishing detection
Hypertext systems
hybrid features
Human Factors
Human behavior
feature-rich machine learning technique
feature extraction
cyber security
Computer crime
blacklisting
anti-phishing system
biblio
WC-PAD: Web Crawling based Phishing Attack Detection
Submitted by aekwall on Mon, 03/09/2020 - 11:12am
Web crawler
nonphishing websites
phase attack detection
phishing attack detector
phishing detection approach
phishing occurrence
phishing Websites
WC-PAD
web content
Heuristics
Web crawling
Web traffics
Zero-day phishing
zero-day phishing attack detection
zero-day phishing website attacks
Security Heuristics
predictability
IP networks
government websites
cloud storage hosting sites
attackers
blacklisting
Law
Uniform resource locators
Phishing
unsolicited e-mail
Web sites
Crawlers
Computer crime
pubcrawl
Resiliency
feature extraction
Scalability
biblio
Automatic Whitelist Generation for SQL Queries Using Web Application Tests
Submitted by grigby1 on Mon, 02/10/2020 - 11:26am
severe vulnerability issue
query patterns
query processing
Registers
relational databases
relational database security
research and development
resilience
Resiliency
security of data
query detection
SQL
SQL detection
SQL injection
SQL queries
Web application test
Web application tests
Whitelist
Whitelists
development process
automated generation
Automatic testing
automatic whitelist generation
blacklisting
collaboration
composability
confidential information
Database Security
Databases
application-specific implementations
Human behavior
internet
large-scale Web applications
legitimate queries
Metrics
policy-based governance
privacy
pubcrawl
biblio
SCTD: Smart Reasoning Based Content Threat Defense in Semantics Knowledge Enhanced ICN
Submitted by grigby1 on Tue, 01/21/2020 - 11:27am
security of data
internet
knowledge graph
pubcrawl
resilience
Resiliency
Scalability
SCTD
security knowledge-based defense mechanism
information-centric networking
semantic obfuscation
semantic reasoning
semantic relations
Semantics
smart based defense mechanism
smart reasoning algorithms
smart reasoning based content threat defense
subscription-based naming mechanism
Extranets
cognition
computer architecture
content semantic awareness
content threats
content-based defense mechanism
context communication content
distributed processing
edge computing
blacklisting
fog computing based defense mechanism
ICN edge defense system
ICN protocols
ICN semantic features
inference mechanisms
Information Centric Network
Information Centric Networks
biblio
Phishing URL Detection via CNN and Attention-Based Hierarchical RNN
Submitted by aekwall on Mon, 01/20/2020 - 12:13pm
Phishing Detection
Uniform resource locators
Fuses
attention-based hierarchical recurrent neural network module
attention-based hierarchical RNN
blacklisting
character-level spatial feature representations
convolutional neural network module
deep learning-based approach
feature engineering
Human Factors
phishing uniform resource locators
phishing URL classifier
phishing URL detection
phishing Websites
three-layer CNN
word-level temporal feature representations
zero-day phishing attacks
zero trust
pattern classification
cyber security
Electronic mail
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
policy-based governance
machine learning
Scalability
Computer crime
internet
Web sites
unsolicited e-mail
convolutional neural nets
recurrent neural nets
Phishing
deep learning
biblio
A Methodical Overview on Phishing Detection along with an Organized Way to Construct an Anti-Phishing Framework
Submitted by grigby1 on Tue, 11/26/2019 - 3:47pm
pubcrawl
machine learning
personal information
Phishing
phishing approaches
phishing attack
Phishing Detection
phishing Websites
phishy URL
internet
security and privacy
security attack
tools
Uniform resource locators
unsolicited e-mail
Web sites
website features
credit card details
Anti Phishing Working Group
Anti-phishing
Anti-Phishing framework
anti-phishing model
Banking
blacklisting
classification
Computer crime
account details
emails
feature extraction
Google
HTTPs
Human behavior
human factor
in-use anti-phishing tools
biblio
Augmenting Telephone Spam Blacklists by Mining Large CDR Datasets
Submitted by aekwall on Mon, 08/05/2019 - 10:35am
blacklisting
cdr mining
composability
expandability
machine learning
pubcrawl
Resiliency
telephone spam
VoIP
biblio
Prevention of Ransomware Execution in Enterprise Environment on Windows OS: Assessment of Application Whitelisting Solutions
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
unauthorized applications
Organizations
pubcrawl
Ransomware
ransomware execution prevention
Resiliency
SecureAPlus
Signature based
Trusted Computing
Microsoft Windows (operating systems)
virtual environment
VoodooShield
whitelisting
Windows edition
Windows Operating System Security
Windows OS
Windows Server edition
zero-day antimalware solution
composability
application control solutions
application whitelisting software
Application Whitelisting Solutions
AppLocker
authorisation
blacklisting
business data processing
CodeShield
administrative privileges
Cryptography
data breach prevention
Databases
enterprise environment
invasive software
malicious files
malware
Metrics
biblio
Random forest explorations for URL classification
Submitted by grigby1 on Wed, 12/20/2017 - 1:08pm
Phishing
Web sites
URL classification
unsolicited e-mail
Uniform resource locators
Training
testing
Random forest explorations
Radio frequency
pubcrawl
phishing Websites
blacklisting
pattern classification
machine learning algorithms
learning (artificial intelligence)
internet
Human Factors
Human behavior
feature extraction
Computer crime
common defence users
Classification algorithms
biblio
Scalable Revocation Scheme for Anonymous Credentials Based on N-times Unlinkable Proofs
Submitted by grigby1 on Mon, 05/22/2017 - 2:02pm
attribute-based credentials
blacklisting
e-ticketing
EID
privacy
pubcrawl
revocation
Scalability
security scalability
smart-cards
« first
‹ previous
1
2