Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

cybercrime activities

biblio

Visible to the public Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection

Submitted by grigby1 on Tue, 11/26/2019 - 3:47pm
  • random forests
  • pattern classification
  • personal information
  • Phishing
  • phishing attack detection
  • Phishing Detection
  • phishing Web sites
  • pubcrawl
  • random forest classification
  • machine learning-based strategies
  • rough set theory
  • Rough sets
  • Training
  • Uniform resource locators
  • universal feature set
  • Web pages
  • Web sites
  • Fuzzy Rough Set
  • Computer crime
  • confidential information
  • cybercrime activities
  • definitive features
  • Electronic mail
  • feature extraction
  • Feature Selection
  • FRS feature selection
  • classifiers
  • fuzzy rough set feature selection
  • fuzzy rough set theory
  • fuzzy set theory
  • generalizable phishing detection
  • Human behavior
  • human factor
  • legitimate Web site
biblio

Visible to the public Cloud-Centric Framework for Isolating Big Data as Forensic Evidence from IoT Infrastructures

Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
  • Internet of Things
  • sensors
  • security
  • Scalability
  • Resiliency
  • pubcrawl
  • proliferation
  • parallel processing
  • nanotechnology
  • miniaturization
  • Metrics
  • IoT infrastructures
  • IoT
  • Big Data
  • forensic evidence
  • Digital Forensics
  • Data Security
  • data exchange
  • cybercrime activities
  • cloud-computing
  • cloud-centric framework
  • Cloud Computing
  • CFIBD-IoT framework
  • business processes
  • big data security in the cloud
  • Big data isolation

Terms of Use  |  ©2023. CPS-VO