Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Electronic mail
biblio
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure
Submitted by aekwall on Mon, 11/09/2020 - 12:11pm
Layout
Vulnerability
source code (software)
software reusability
Software
security of data
security
Resiliency
relative memory
pubcrawl
Position-Independent Code-Reuse Attacks
Payloads
multiple position-independent ROP
Memory management
address-space layout randomization
just-in-time code-reuse attacks
Information Reuse and Security
information disclosure mitigation
information disclosure detection
exploitation
Electronic mail
computer science
Compositionality
code pointers
code gadgets
code addresses
ASLR
advanced attacker
biblio
Assessing E-Security Behavior among Students in Higher Education
Submitted by aekwall on Mon, 10/12/2020 - 10:45am
behavior
Human Behavior and Cybersecurity
United Arab Emirates
Security Behavior Survey Instrument
password usage
online scam
higher educational institutions
higher education students
further education
e-security behavior assessment
E-security awareness
social engineering
Educational institutions
authorisation
data handling
Human Factors
Phishing
password
Cybersecurity
internet
Computer crime
pubcrawl
Human behavior
Electronic mail
invasive software
malware
biblio
FraudFind: Financial fraud detection by analyzing human behavior
Submitted by aekwall on Mon, 10/12/2020 - 10:43am
auditing
Human Behavior and Cybersecurity
triangle of fraud
senior managers
semantic techniques
payroll employees
FraudFind
fraud triangle theory
financial fraud detection
financial audit model
Continuous Audit
bank fraud
Human Factors
human factor
security of data
Banking
financial data processing
behavioural sciences computing
fraud
Personnel
Data mining
Cybersecurity
tools
pubcrawl
Human behavior
Electronic mail
real-time systems
Organizations
biblio
An Instrument to Measure Human Behavior Toward Cyber Security Policies
Submitted by aekwall on Mon, 10/12/2020 - 10:42am
Human Factors
security of data
pubcrawl
password
Organizations
Masuerment instrument
Instruments
information technology
Information system policie
information security
behavior pattern
human error
human behavior measurement
Human Behavior and Cybersecurity
Human behavior
Gamification
Electronic mail
cybersecurity policies
Cyber security policies
component
biblio
Authentication Model using the Bundled CAPTCHA OTP Instead of Traditional Password
Submitted by grigby1 on Fri, 09/11/2020 - 10:43am
Electronic mail
CAPTCHA
unique random parameter
traditional password
one time password
identity verification
e-mail
captchas
CAPTCHA OTP
Bundled CAPTCHA OTP
authentication model
authorisation
password
composability
Computational modeling
authentication
telecommunication security
message authentication
Human behavior
pubcrawl
Servers
biblio
Attacks and vulnerability analysis of e-mail as a password reset point
Submitted by grigby1 on Fri, 09/04/2020 - 2:24pm
e-mail servers
brute force attacks
Vulnerability Analysis
social media
Social engineering attack
self-service password reset point
security questions
public knowledge attainable
personal Email account
Password Reset
Mobile handsets
mobile devices
middle attack
Email
authorisation
Brute-force Attack
Computer hacking
policy-based governance
Human Factors
Security analysis
password
Electronic mail
emails
collaboration
pubcrawl
internet
Protocols
biblio
Blind Certificate Authorities
Submitted by grigby1 on Thu, 08/13/2020 - 4:21pm
SMTP servers
public key cryptography
public key registration
resilience
Resiliency
Scalability
SCI protocol
secure channel injection protocols
Secure-Multiparty-Computation
pubcrawl
standard email server implementations
TLS
truly anonymous systems
X.509 Certificate
zero-knowledge certificate
zero-knowledge certificate signing protocol
Zero-knowledge-Proof
Cryptographic Protocols
alice@domain.com
anonymity
anonymous messaging
anonymous proofs
authorisation
authorization
blind certificate authority
certificate binding
account ownership
data privacy
digital signatures
Electronic mail
Gmail
MPC
party encrypted communications
privacy
biblio
A survey of zero-day malware attacks and its detection methodology
Submitted by grigby1 on Fri, 07/10/2020 - 12:08pm
invasive software
zero-days
zero-day malware attacks
security systems
Resiliency
resilience
pubcrawl
Privacy-invasive software
Metrics
malware outbreaks
malware developers
malware detection
malware
large-scale attacks
advanced persistent threats
Human Factors
Human behavior
end-point security solutions
Electronic mail
detection methodology
detection
cryptojacking
Cryptography
Code Obfuscation
botnets
botnet
APT
analysis
biblio
E-Mail Classification Using Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 9:54am
k-means algorithm
Word2Vec algorithm
Word2Vec
Web page memberships
unsupervised training model
unsolicited e-mail
Tokenization
test phase M3 model
Skip Gram
serious communication tool
reminders
Electronic mail
e-mail classification
business correspondence
academic notices
Scalability
Unsupervised Learning
k-means
natural language processing
spam e-mails
Postal services
text classification
text analysis
pattern classification
pubcrawl
Human behavior
Resiliency
Support vector machines
Classification algorithms
biblio
Detecting Phishing Attacks Using Natural Language Processing and Machine Learning
Submitted by aekwall on Mon, 05/18/2020 - 9:53am
phishing attack detection
unsolicited e-mail
Uniform resource locators
text analysis
social engineering
Semantics
security threats
Scalability
Resiliency
pubcrawl
phishing emails
blacklisting
Phishing
natural language text
natural language processing
malicious intent detection
machine learning
learning (artificial intelligence)
inappropriate statements detection
Human behavior
Electronic mail
Computer crime
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »