Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Phishing
biblio
Improvement in Phishing Websites Detection Using Meta Classifiers
Submitted by grigby1 on Fri, 06/19/2020 - 10:49am
Phishing
WEKA
Web sites
trusted Web pages
Trusted Computing
smart devices
single classifier model
Scalability
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
policy-based governance
Phishing Websites Detection
phishing Websites
Accuracy
personal information
pattern classification
modern computers
meta classifiers
Meta Classifier
Internet security
internet
fraudulent websites
fraudulent practices
false trust
F-measure
ensemble classifiers
Computer crime
biblio
An Extensive Formal Analysis of Multi-factor Authentication Protocols
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
Protocols
Metrics
multifactor authentication
multifactor authentication protocols
P ROVERIF tool
password
Phishing
pi calculus
protocol analysis attackers
message authentication
pubcrawl
resilience
Resiliency
Servers
threat model
threat scenarios
users authentication
authentication
malwares
invasive software
Human Factors
Human behavior
Google 2-step
Google
FIDO U2F
extensive formal analysis
data privacy
Cryptographic Protocols
Computer crime
Communication Network
automated protocol analysis
authorisation
authentication mechanisms
biblio
Big Data Security Issues and Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 9:54am
Computer crime
natural language processing technology
DNS
cyber security issues
big data security issues
advanced persistent threat detection
Phishing
Information Assurance
data privacy
natural language processing
cyber-attacks
spam detection
Vulnerability Analysis
advanced persistent threat
pubcrawl
Human behavior
Resiliency
information security
cyber security
security
malware
Conferences
Organizations
Big Data
Scalability
biblio
Detecting Phishing Attacks Using Natural Language Processing and Machine Learning
Submitted by aekwall on Mon, 05/18/2020 - 9:53am
phishing attack detection
unsolicited e-mail
Uniform resource locators
text analysis
social engineering
Semantics
security threats
Scalability
Resiliency
pubcrawl
phishing emails
blacklisting
Phishing
natural language text
natural language processing
malicious intent detection
machine learning
learning (artificial intelligence)
inappropriate statements detection
Human behavior
Electronic mail
Computer crime
biblio
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists
Submitted by grigby1 on Fri, 04/17/2020 - 9:44am
resilience
mobile computing
modern phishing websites
native blacklisting
Organizations
PhishFarm framework
Phishing
phishing attacks
phishing kits
pubcrawl
mobile browsers
Resiliency
security
security of data
unsolicited e-mail
Web Browser Security
Web browsers
Web sites
web-browser
diverse cloaking techniques
anti-phishing-ecosystem
blacklisting
browser blacklists
browser phishing blacklists
Browsers
Cloaking
composability
Compositionality
Computer crime
anti-phishing entities
Ecosystems
evasion techniques
HTTP request
Human behavior
Human Factors
internet
live phishing sites
Metrics
biblio
Power of Communication Behind Extreme Cybersecurity Incidents
Submitted by grigby1 on Fri, 04/10/2020 - 11:53am
Phishing
surrounding threats
security of data
Scalability
risk mitigations
risk management
risk analysis
Resiliency
resilience
pubcrawl
Protocols
Computational modeling
Pervasive Computing Security
Metrics
internet
Human Factors
Human behavior
extreme cybersecurity incidents
Electronic mail
Cyberspace
Cybersecurity
biblio
Detection of Phishing websites using Generative Adversarial Network
Submitted by grigby1 on Fri, 04/10/2020 - 11:37am
internal structure
Web sites
Uniform resource locators
Training
synthetic phishing features
security analytics
pubcrawl
phishing Websites
Phishing Detection
phishing datasets
Phishing
pattern classification
normal Websites
neural nets
meta data
low-risk rightreward nature
attack vector
Human Factors
Human behavior
hacking endeavour
Generators
generator network
generative adversarial networks
generative adversarial network
Gallium nitride
feature extraction
external metadata
discriminator network
Computer crime
Cloud Security
Big Data Analytics
biblio
Phishing URL Detection Via Capsule-Based Neural Network
Submitted by grigby1 on Fri, 04/10/2020 - 11:37am
Neural networks
Web sites
URL Detection
unsolicited e-mail
Uniform resource locators
uniform resource locator
substantial manual feature engineering
social engineering
sensitive information
pubcrawl
phishing Website
phishing detection method
Phishing Detection
phishing criminals
phishing attacks
Phishing
capsule network
machine learning
Human Factors
Human behavior
Heuristic algorithms
feature representations
feature extraction
deep learning
cyber security
cyber attack
critical threat
convolutional neural nets
convolutional layer
convolution
Computer crime
capsule-based neural network
biblio
An Adaptive Machine Learning Based Approach for Phishing Detection Using Hybrid Features
Submitted by grigby1 on Fri, 04/10/2020 - 11:36am
machine learning
World Wide Web
Webpages source code
Web threats
Web sites
web security
URLs
Uniform resource locators
reliable detection system
real-time systems
pubcrawl
phishing Websites
Phishing Detection
phishing attackers
Phishing
adaptive machine learning based approach
Learning Classifier System
learning (artificial intelligence)
internet
intelligent phishing detection
Hypertext systems
hybrid features
Human Factors
Human behavior
feature-rich machine learning technique
feature extraction
cyber security
Computer crime
blacklisting
anti-phishing system
biblio
Classifying Phishing Email Using Machine Learning and Deep Learning
Submitted by grigby1 on Fri, 04/10/2020 - 11:36am
one-hot encoding
Web sites
unsolicited e-mail
text analysis
Support vector machines
Semantics
pubcrawl
phishing emails
phishing email
Phishing
pattern classification
Computer crime
machine learning
learning (artificial intelligence)
Human Factors
Human behavior
encoding
email text
Electronic mail
deep semantic analysis
deep learning
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »