Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Phishing
biblio
Detection of compromised email accounts used for spamming in correlation with origin-destination delivery notification extracted from metadata
Submitted by grigby1 on Wed, 12/20/2017 - 1:08pm
ODDN
Unsolicited electronic mail
unsolicited e-mail
spam messages
spam
Servers
remote SMTP server
pubcrawl
Postal services
phishing messages
Phishing
pattern classification
origin-destination delivery notification extracted
Origin-Destination Delivery Notification
authentication
metadata
IP networks
incoming junk mail detection
Human Factors
Human behavior
hacked
geographical origin
encrypted phishing
delivery status notification
data privacy
compromised email account detection
compromised email account
biblio
Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
Human Factors
Web sites
user interface support
transport protocols
security
representative Webpage
pubcrawl
psychology
phishing Websites
phishing detection scenario
phishing attacks
Phishing
Knowledge engineering
ACT-R cognitive behaviour architecture model
human detection
human behaviour
Human behavior
HTTPS padlock security indicator
Decision Making
computer science
computer network security
computer model
Computer crime
computer architecture
Computational modeling
biblio
A Content-Based Phishing Email Detection Method
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
information extraction
unsolicited e-mail
social engineering criteria
social engineering concepts
social engineering
semantic Web database
Semantic Web
Resource description framework
pubcrawl
phishing email
Phishing
Investment
information storage
Computer crime
Human Factors
Human behavior
fuzzy logic control algorithm
fuzzy control
Filtering
email categories
Electronic mail
Databases
database management systems
cybernetics
Creativity
content-based phishing email detection
biblio
Phishing detection: A recent intelligent machine learning comparison based on models content and features
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
pubcrawl
Phishing
phishing attacks
phishing datasets
Phishing Detection
phishing detection rate
Predictive Metrics
Predictive models
predictive security metrics
online community
security
tools
Training
Trusted Computing
trusted Websites
Web sites
Web Threat
World Wide Web
Human behavior
Artificial Neural Networks
Classification algorithms
Computer crime
computer security
data analysis
Decision trees
fake Websites
financial assets
anti-phishing tools
Human Factors
intelligent machine learning comparison
internet
learning (artificial intelligence)
machine learning
ML predictive models
online attack
biblio
Phishing websites classifier using polynomial neural networks in genetic algorithm
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
genetic algorithms
Web sites
Statistics
Sociology
pubcrawl
phishing Websites classifier
Phishing
neural networks techniques
Neural networks
Neural network (NN)
neural nets
improved polynomial neural networks
Human Factors
Human behavior
AI techniques
Genetic Algorithm (GA)
genetic algorithm
Error analysis
data structures
data structure
Data mining
data classification
Computer crime
classification techniques
chromosome recombination operators
brain
Artificial Intelligence
biblio
Fresh-Phish: A Framework for Auto-Detection of Phishing Websites
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
Electronic mail
Human behavior
Human Factors
internet
Kernel
machine learning
malware
Phishing
pubcrawl
Support vector machines
TensorFlow
Uniform resource locators
biblio
Phishing website detection framework through web scraping and data mining
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
Crawlers
Data mining
feature extraction
heuristic weights
Human behavior
Human Factors
Phishing
Phishing Detection
pubcrawl
Training data
Uniform resource locators
visualization
Web crawler
biblio
A more secure scheme for CAPTCHA-based authentication in cloud environment
Submitted by grigby1 on Wed, 12/20/2017 - 1:03pm
Phishing
human beings
Human Factors
information technology
message authentication
modified characters
on-demand network access
passkey
password guessing
password-based authentication
Human behavior
pubcrawl
salted hashes
secure scheme
security-related issues
short-password attack
single password
social engineering
user authentication
composability
authentication mechanism
authorisation
CAPTCHA
CAPTCHA-based authentication
captchas
Cloud Computing
cloud environment
cloud provider
cloud providers
authentication
Computer crime
configurable adaptive resources
critical security function
Cryptography
Dictionaries
dictionary attack
elastic collection
Handheld computers
biblio
A Maginot Line in Cyberspace: The Binding Operational Directive BOD-18-01 DMARC Mandate
Submitted by rzager on Mon, 10/30/2017 - 6:12pm
Cybersecurity
Maginot Line
Phishing
spearphishing
BOD-18-01
DMARC
biblio
{MASPHID}: {A} {Model} to {Assist} {Screen} {Reader} {Users} for {Detecting} {Phishing} {Sites} {Using} {Aural} and {Visual} {Similarity} {Measures}
Submitted by grigby1 on Fri, 10/27/2017 - 10:55am
Anti-phishing
cyber-crime
Persons with Visual Impairments
Phishing
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »