Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Electronic mail
biblio
Phishing URL Detection via CNN and Attention-Based Hierarchical RNN
Submitted by aekwall on Mon, 01/20/2020 - 11:13am
Phishing Detection
Uniform resource locators
Fuses
attention-based hierarchical recurrent neural network module
attention-based hierarchical RNN
blacklisting
character-level spatial feature representations
convolutional neural network module
deep learning-based approach
feature engineering
Human Factors
phishing uniform resource locators
phishing URL classifier
phishing URL detection
phishing Websites
three-layer CNN
word-level temporal feature representations
zero-day phishing attacks
zero trust
pattern classification
cyber security
Electronic mail
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
policy-based governance
machine learning
Scalability
Computer crime
internet
Web sites
unsolicited e-mail
convolutional neural nets
recurrent neural nets
Phishing
deep learning
biblio
Detection of Phishing Attacks
Submitted by grigby1 on Tue, 11/26/2019 - 2:48pm
Phishing
information security
Intrusion Detection
Intrusion Detection Systems
login credentials
mail contents
malicious links
money loss
official person
identity theft
phishing attacks
phishing emails
Postal services
pubcrawl
spam mails
spam words
Uniform resource locators
unsolicited e-mail
detection problem
attachments
attacker
Bayes methods
Bayesian algorithm
Classification algorithms
communication mediums
Computer crime
cyber attack
Anti Phishing Simulator
digital simulation
e-mail
e-mails harm victims
Electronic mail
Filtering
Human behavior
human factor
biblio
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
Submitted by grigby1 on Tue, 11/26/2019 - 2:47pm
random forests
pattern classification
personal information
Phishing
phishing attack detection
Phishing Detection
phishing Web sites
pubcrawl
random forest classification
machine learning-based strategies
rough set theory
Rough sets
Training
Uniform resource locators
universal feature set
Web pages
Web sites
Fuzzy Rough Set
Computer crime
confidential information
cybercrime activities
definitive features
Electronic mail
feature extraction
Feature Selection
FRS feature selection
classifiers
fuzzy rough set feature selection
fuzzy rough set theory
fuzzy set theory
generalizable phishing detection
Human behavior
human factor
legitimate Web site
biblio
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections
Submitted by grigby1 on Wed, 10/23/2019 - 11:38am
revoked certificates checking
log-based schemes
Metrics
Monitoring
Protocols
pubcrawl
public key cryptography
query processing
resilience
Resiliency
log servers
Scalability
Security analysis
Servers
SSL connections
SSL Trust Models
system monitoring
telecommunication security
TLS connections
data consistency
blockchain system
blockchain-based public
Certchain
certificate audit service
certificate forward traceability
certificate revocation checking
certificate revocation mechanisms
certification
Cryptographic Protocols
auditing
data privacy
data structure
data structures
DCBF
dependability-rank based consensus protocol
dual counting bloom filter
Electronic mail
Human behavior
biblio
Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation
Submitted by aekwall on Tue, 10/22/2019 - 8:54am
employees motivation
Security Policies Analysis
variable perceived value congruence
self-determination theory
Security policy compliant behaviour
security performance
Saudi Arabia
relatedness
perceived value congruence
perceived legitimacy
ISP compliance intentions
intrinsic motivation
information security policy compliance
information security policy
Fortune 600 organization
security of data
competence
behavioral research
autonomy
Human Factors
Personnel
computer security
Mathematical model
organisational aspects
policy-based governance
pubcrawl
Electronic mail
information security
Data models
Task Analysis
biblio
Advanced Petya Ransomware and Mitigation Strategies
Submitted by aekwall on Mon, 10/07/2019 - 10:43am
encryption
Resiliency
ransomware attack
Ransomware
pubcrawl
Petya ransomware
Organizations
Mitigations
Metrics
invasive software
heavy ransom
encryption codes
Advance Petya ransomware
Electronic mail
Cyber-security
cyber-attack
cyber world
cyber threats
cyber era
Cryptography
Computer crime
composability
anti-virus detection
biblio
Dynamic malware analysis of phishing emails
Submitted by aekwall on Mon, 06/24/2019 - 1:41pm
potentially new malwares
Malware Analysis
malware authors
malware samples
Metrics
network communication
operating system
Phishing
phishing emails
malware
pubcrawl
Resiliency
Servers
Signature Generation
SPIM messages
standard analysis methodology
system monitoring
tools
digital signatures
anomaly signature
anti-malware
anti-virus products
automatic generation
complete dynamic analysis laboratory setting
comprehensive dynamic analysis
Computer crime
computer viruses
active signature
dynamic analysis laboratory setting
Dynamic Malware Analysis
Electronic mail
honeynet
Human behavior
internet
invasive software
biblio
Demonstrating Different Phishing Attacks Using Fuzzy Logic
Submitted by grigby1 on Wed, 05/01/2019 - 10:29am
Metrics
Web sites
unsolicited e-mail
Uniform resource locators
security of data
security
Resiliency
resilience
pubcrawl
phishing sites
Phishing Detection
phishing attacks
Phishing
pagerank
online banking passwords
bank account details
Membership functions
malicious website
legitimate websites
indexing
global security
Fuzzy logic
fraudulent websites
Fraudulent
Electronic mail
Defuzzification
Data mining
Computer crime
Classification algorithms
Bars
biblio
Situational Awareness Framework for Cyber Crime Prevention Model in Cyber Physical System
Submitted by grigby1 on Thu, 03/28/2019 - 2:13pm
physical space
factor analysis of information risk model
FAIR Model
Frequency measurement
IoT
Loss measurement
Metrics
national confidential data
personal information
Electronic mail
pubcrawl
resilience
Resiliency
risk management
security of data
situational awareness
situational awareness framework
surveillance
composability
Human Factors
Human behavior
privacy
CPS Privacy
5G mobile
Aerospace electronics
Artificial Intelligence
Big Data
cyber physical systems
CPS environment
Cps technology
CPTED
crime prevention through environmental design
Cyber Crime Prevention Model
Cyber Physical System
Cyberspace
cyberspace attacks
biblio
Information Requirements for National Level Cyber Situational Awareness
Submitted by grigby1 on Thu, 03/28/2019 - 2:13pm
Information Assurance
Stakeholders
situational awareness
security of data
Resiliency
resilience
pubcrawl
nonadversarial service management mistakes
national level cyber situational awareness
national information assurance exercise
Metrics
information requirements
information elements
adversarial behavior
government officials
Government
Electronic mail
cyber situational awareness-decision-makers
cyber security
critical infrastructures
critical infrastructure
Crisis Management
Computer crime
composability
common operational picture
adversarial cyberattacks
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »