Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Phishing
biblio
Measuring the Information Security Awareness Level of Government Employees Through Phishing Assessment
Submitted by grigby1 on Fri, 04/10/2020 - 12:36pm
information security awareness
unsolicited e-mail
pubcrawl
phishing simulation
phishing assessment
Phishing
Personnel
password
knowledge approach
knowledge and behavioral approach
information security instruments
information security awareness level
behavior approach
Indonesia
Human Factors
Human behavior
government information security
government employees
government data processing
Government
employees information security awareness
Directorate General of ABC
DG ABC employees
Computer crime
biblio
Building Confidence not to be Phished Through a Gamified Approach: Conceptualising User's Self-Efficacy in Phishing Threat Avoidance Behaviour
Submitted by grigby1 on Fri, 04/10/2020 - 12:36pm
observational knowledge
user self-efficacy
Training
tools
Threat avoidance motivation and behaviour
threat avoidance motivation
structural knowledge
social cognitive theory
Self-Efficacy
pubcrawl
phishing threat prevention behaviour
phishing threat avoidance behaviour
phishing attacks
phishing attack
Phishing
online identity theft attack
Human Behavior and Cybersecurity
knowledge attributes
Knowledge
internet
Human Factors
Human behavior
heuristic knowledge
gaming prototype
gamified approach
Gamification/Gamified approach
Games
Electronic mail
Computers
computer games
Computer crime
cognition
biblio
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists - IEEE Conference Publication
Submitted by grigby1 on Fri, 04/10/2020 - 12:36pm
Human behavior
Human Factors
Phishing
pubcrawl
biblio
A Machine Learning Approach for URL Based Web Phishing Using Fuzzy Logic as Classifier
Submitted by grigby1 on Fri, 04/10/2020 - 12:35pm
learning (artificial intelligence)
Web sites
Web Mining
URL based Web phishing
Uniform resource locators
security of data
pubcrawl
phishing URL
phishing site
Phishing Detection
phishing attacks
Phishing
pattern classification
machine learning
classifier
internet
Human Factors
Human behavior
fuzzy logic classifier
Fuzzy logic
financial information
feature extraction
Databases
Data mining
credential information
Conferences
Computer crime
biblio
WC-PAD: Web Crawling based Phishing Attack Detection
Submitted by aekwall on Mon, 03/09/2020 - 11:12am
Web crawler
nonphishing websites
phase attack detection
phishing attack detector
phishing detection approach
phishing occurrence
phishing Websites
WC-PAD
web content
Heuristics
Web crawling
Web traffics
Zero-day phishing
zero-day phishing attack detection
zero-day phishing website attacks
Security Heuristics
predictability
IP networks
government websites
cloud storage hosting sites
attackers
blacklisting
Law
Uniform resource locators
Phishing
unsolicited e-mail
Web sites
Crawlers
Computer crime
pubcrawl
Resiliency
feature extraction
Scalability
biblio
True2F: Backdoor-Resistant Authentication Tokens
Submitted by aekwall on Mon, 03/02/2020 - 12:27pm
Browsers
two-party protocols
token faults
software compromise
second-factor authentication
privacy defenses
Phishing
embedded-systems
ECDSA signatures
cross-origin token-fingerprinting attacks
conventional authentication tokens
commodity hardware tokens
Backdoors
backdoor-resistant authentication tokens
two factor authentication
cryptographic keys
security
Human Factors
public key cryptography
Public key
digital signatures
authentication
privacy
web services
Computer crime
standards
pubcrawl
Protocols
Cryptographic Protocols
Hardware
data privacy
authorisation
biblio
Authentication Protocols Based on One-Time Passwords
Submitted by aekwall on Mon, 03/02/2020 - 12:26pm
cryptographic algorithms
reviewed protocols
Resistance
relatively old Lamport's hash-chain protocol
one-time passwords
one-time password
information technologies
e-commerce
complicated protocols
two factor authentication
two-factor authentication
Authentication Protocols
electronic commerce
Servers
protocol
Human Factors
Phishing
Fingerprint recognition
authentication
message authentication
Vulnerability
Cryptography
pubcrawl
information security
Cryptographic Protocols
biblio
Phishing in Depth – Modern Methods of Detection and Risk Mitigation
Submitted by grigby1 on Wed, 02/26/2020 - 4:44pm
Phishing
virtual experiences
unsolicited e-mail
threats
threat mitigation
threat
security measures
security defense mechanisms
risk mitigation
Resiliency
resilience
pubcrawl
Attack vectors
Metrics
mass email infrastructures
machine learning
Human Factors
Human behavior
fraudulent content
fraud
email attacks
electronic mail service
Computer crime
biblio
Tools and Techniques for Improving Cyber Situational Awareness of Targeted Phishing Attacks
Submitted by grigby1 on Mon, 02/17/2020 - 5:17pm
resilience
visualisation tools
visualisation
user experience
unsolicited e-mail
unauthorised access
targeted phishing campaigns
targeted phishing attacks
situational awareness
Security Awareness
Resiliency
authorisation
pubcrawl
phishing attacks
Phishing
Metrics
internet
information security
data visualisation
cyber situational awareness
Computer crime
composability
biblio
The Roving Proxy Framewrok for SMS Spam and Phishing Detection
Submitted by grigby1 on Mon, 02/10/2020 - 11:18am
roving proxy framework
unsolicited e-mail
Training
testing
spam detection
SMS Spam
SMS phishing detection
SMishing attacks
SMishin
Servers
Scalability
BYOD security
pubcrawl
Phishing
Mobile handsets
Metrics
Human Factors
Human behavior
feature extraction
convergence
Computer crime
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »