Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
social engineering
biblio
A Content-Based Phishing Email Detection Method
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
information extraction
unsolicited e-mail
social engineering criteria
social engineering concepts
social engineering
semantic Web database
Semantic Web
Resource description framework
pubcrawl
phishing email
Phishing
Investment
information storage
Computer crime
Human Factors
Human behavior
fuzzy logic control algorithm
fuzzy control
Filtering
email categories
Electronic mail
Databases
database management systems
cybernetics
Creativity
content-based phishing email detection
biblio
A more secure scheme for CAPTCHA-based authentication in cloud environment
Submitted by grigby1 on Wed, 12/20/2017 - 1:03pm
Phishing
human beings
Human Factors
information technology
message authentication
modified characters
on-demand network access
passkey
password guessing
password-based authentication
Human behavior
pubcrawl
salted hashes
secure scheme
security-related issues
short-password attack
single password
social engineering
user authentication
composability
authentication mechanism
authorisation
CAPTCHA
CAPTCHA-based authentication
captchas
Cloud Computing
cloud environment
cloud provider
cloud providers
authentication
Computer crime
configurable adaptive resources
critical security function
Cryptography
Dictionaries
dictionary attack
elastic collection
Handheld computers
biblio
Social Engineering for Security Attacks
Submitted by grigby1 on Tue, 09/05/2017 - 1:43pm
advance persistent threat (APT)
composability
Metrics
network accountability
pubcrawl
Resiliency
social engineering
Social Network Security
Spear-phishing
biblio
The Persuasive Phish: Examining the Social Psychological Principles Hidden in Phishing Emails
Submitted by grigby1 on Mon, 04/24/2017 - 11:44am
Email
Human behavior
persuasion
Phishing
phishing attack
pubcrawl
security
social engineering
file
p126-zielinska.pdf
Submitted by drwright on Fri, 07/01/2016 - 1:34pm
Email
persuasion
Phishing
security
social engineering
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
biblio
The Persuasive Phish: Examining the Social Psychological Principles Hidden in Phishing Emails
Submitted by drwright on Fri, 07/01/2016 - 1:34pm
Email
persuasion
Phishing
security
social engineering
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
file
Journal_of_CyberBehavior_Submission_07_29_15.docx
Submitted by cmayhorn on Tue, 10/06/2015 - 1:55pm
Human Factors
phishing attacks
psychology
social engineering
biblio
Will the “Phisher-men” Reel you in? Assessing Individual Differences in a Phishing Detection Task
Submitted by cmayhorn on Tue, 10/06/2015 - 1:55pm
Human Factors
phishing attacks
psychology
social engineering
biblio
Social Engineering in Social Networking Sites: The Art of Impersonation
Submitted by BrandonB on Thu, 04/30/2015 - 1:50pm
social engineering victimization
physical crime
Receivers
security
sexual abuse
SNS
social aspects of automation
social engineering
social engineering traps
Phishing
social engineeringtactics
social networking (online)
Social networking sites
source credibility
threats
Trust management
user susceptibility
attacker
Organizations
large information base
Interviews
information security management
impersonation
identity theft
human behaviors complexity
grounded theory method
fraudulent people
fraud
financial abuse
Facebook
encoding
deceptive people
Computer crime
biblio
Combatting phishing: A holistic human approach
Submitted by BrandonB on Thu, 04/30/2015 - 1:31pm
security vulnerability
organizational aspects
Phishing
phishing security controls
security
security education
security education training and awareness
security gaps
security training
organisational aspects
social engineering
spoofed-Web sites
technological controls
technology acceptance model
Training
trusted reputation
unsolicited e-mail
fake warnings
ails
awareness programme
COBIT
Computer crime
computer science education
cyber criminals
design science principles
educational factors
agency theory
financial awards
holistic human approach
HOT elements
Human Factors
ISO
lax security behavior
Lead
« first
‹ previous
1
2
3
4
next ›
last »