Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Phishing
biblio
Detection of Phishing Websites using Machine Learning
Submitted by grigby1 on Thu, 05/20/2021 - 12:32pm
pubcrawl
Web Browser Security
Videos
Uniform resource locators
social networking (online)
Semantics
Semantic analysis methods
Resiliency
resilience
Browsers
phishing attack
Phishing
Metrics
machine learning
Human behavior
Electronic mail
database
Compositionality
biblio
APTrace: A Responsive System for Agile Enterprise Level Causality Analysis
Submitted by aekwall on Tue, 04/27/2021 - 1:35pm
network security
Scalability
malware
Resiliency
pubcrawl
Phishing
Security Heuristics
predictability
unsolicited e-mail
Backtracking
Backtracking analysis
domain language
Domain Specific Languages
expressiveness
responsiveness
biblio
Vision: Shred If Insecure – Persuasive Message Design as a Lesson and Alternative to Previous Approaches to Usable Secure Email Interfaces
Submitted by aekwall on Tue, 04/27/2021 - 1:33pm
Scalability
encryption
security
Electronic mail
Resiliency
pubcrawl
Cryptography
tools
usability
Phishing
Security Heuristics
predictability
usable secure email
user interface design
biblio
Phishing Attack Detection using Machine Learning Classification Techniques
Submitted by grigby1 on Thu, 03/04/2021 - 2:57pm
Metrics
Zero day attacks
Uniform resource locators
Training
Resiliency
resilience
pubcrawl
phishing attack detection
phishing attack
Phishing
Artificial Intelligence
machine learning
Logistics
defense
Decision Tree
Conferences
computer science
composability
Classification algorithms
biblio
Preventive Techniques of Phishing Attacks in Networks
Submitted by grigby1 on Wed, 02/03/2021 - 2:02pm
malware
Web sites
spam
social engineering
security threats
Scalability
Resiliency
resilience
pubcrawl
phishing attack preventive techniques
Phishing
online businesses
online applications
network security
Anti-phishing
machine learning
internet
information technology
information security
Human Factors
Human behavior
honey pots
Honey Pot
fake Websites
fake applications
Electronic mail
e-hunting websites
Computer crime
biblio
Digital Simulation in the Virtual World: Its Effect in the Knowledge and Attitude of Students Towards Cybersecurity
Submitted by grigby1 on Wed, 11/04/2020 - 1:45pm
text-based environment
password usage
Phishing
privacy
pubcrawl
social engineering
student experience
teaching
text analysis
password
user experience
Virtual Learning Environment
Virtual Learning Environments
virtual reality
virtual world
virtual world lessons
VLE
Digital Simulations
Computer crime
computer science education
cyber physical systems
Cybersecurity
cybersecurity attitude
cybersecurity education
cybersecurity knowledge
digital simulation
computer aided instruction
E-Learning
education
Educational institutions
Instruments
invasive software
malware
online scam
biblio
Social Engineering for Diagnostic the Information Security Culture
Submitted by aekwall on Mon, 10/12/2020 - 11:46am
Phishing
Human Behavior and Cybersecurity
social engineering techniques
public university
ISCA survey questionnaire
information security culture assessment
Information Security Culture
information assets protection
information assets
controlled social engineering attacks
social engineering
security
security culture
sensitive information
Human Factors
Cybersecurity
confidential information
Computer crime
pubcrawl
Human behavior
data privacy
biblio
Assessing E-Security Behavior among Students in Higher Education
Submitted by aekwall on Mon, 10/12/2020 - 11:45am
behavior
Human Behavior and Cybersecurity
United Arab Emirates
Security Behavior Survey Instrument
password usage
online scam
higher educational institutions
higher education students
further education
e-security behavior assessment
E-security awareness
social engineering
Educational institutions
authorisation
data handling
Human Factors
Phishing
password
Cybersecurity
internet
Computer crime
pubcrawl
Human behavior
Electronic mail
invasive software
malware
biblio
Classification of XSS Attacks by Machine Learning with Frequency of Appearance and Co-occurrence
Submitted by aekwall on Mon, 09/28/2020 - 12:35pm
pattern classification
XSS attack scripts
Word2Vec
vectorization
Uniform resource locators
Training
SVM
Support vector machines
SCW
Scalability
Resiliency
Random Forest
Radio frequency
pubcrawl
preprocessing method
Phishing
attack detection filter
machine learning algorithms
machine learning
learning (artificial intelligence)
Kernel
internet
information collection
hypermedia markup languages
Human behavior
HTTP cookies
fake HTML input form
dummy sites
Cross Site Scripting
cross site
Computer crime
biblio
Detection of Phishing Attacks with Machine Learning Techniques in Cognitive Security Architecture
Submitted by aekwall on Mon, 09/14/2020 - 12:32pm
Artificial Intelligence
URL analysis
python tools
phishing web attacks detection
cybersecurity analysts
cognitive security architecture
cognitive security application
Artificial Neural Networks
computational intelligence
Compositionality
Uniform resource locators
Data Analytics
Phishing
Cryptography
Python
data analysis
machine learning techniques
Cybersecurity
internet
Computer crime
machine learning
composability
pubcrawl
learning (artificial intelligence)
machine learning algorithms
Big Data
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »