Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Uniform resource locators
biblio
Detection of Phishing Attacks
Submitted by
grigby1
on Tue, 11/26/2019 - 2:48pm
Anti Phishing Simulator
attachments
attacker
Bayes methods
Bayesian algorithm
Classification algorithms
communication mediums
Computer crime
cyber attack
detection problem
digital simulation
e-mail
e-mails harm victims
Electronic mail
Filtering
Human behavior
human factor
identity theft
information security
Intrusion Detection
Intrusion Detection Systems
login credentials
mail contents
malicious links
money loss
official person
Phishing
phishing attacks
phishing emails
Postal services
pubcrawl
spam mails
spam words
Uniform resource locators
unsolicited e-mail
biblio
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
Submitted by
grigby1
on Tue, 11/26/2019 - 2:47pm
classifiers
Computer crime
confidential information
cybercrime activities
definitive features
Electronic mail
feature extraction
Feature Selection
FRS feature selection
Fuzzy Rough Set
fuzzy rough set feature selection
fuzzy rough set theory
fuzzy set theory
generalizable phishing detection
Human behavior
human factor
legitimate Web site
machine learning-based strategies
pattern classification
personal information
Phishing
phishing attack detection
Phishing Detection
phishing Web sites
pubcrawl
random forest classification
random forests
rough set theory
Rough sets
Training
Uniform resource locators
universal feature set
Web pages
Web sites
biblio
A Methodical Overview on Phishing Detection along with an Organized Way to Construct an Anti-Phishing Framework
Submitted by
grigby1
on Tue, 11/26/2019 - 2:47pm
account details
Anti Phishing Working Group
Anti-phishing
Anti-Phishing framework
anti-phishing model
Banking
blacklisting
classification
Computer crime
credit card details
emails
feature extraction
Google
HTTPs
Human behavior
human factor
in-use anti-phishing tools
internet
machine learning
personal information
Phishing
phishing approaches
phishing attack
Phishing Detection
phishing Websites
phishy URL
pubcrawl
security and privacy
security attack
tools
Uniform resource locators
unsolicited e-mail
Web sites
website features
biblio
Forecasting Cyberattacks as Time Series with Different Aggregation Granularity
Submitted by
grigby1
on Tue, 11/12/2019 - 3:26pm
aggregation granularity
ARIMA
auto-regressive integrated moving average models
autoregressive moving average processes
Bayesian networks
belief networks
binary occurrence metrics
Computer crime
computer network security
Correlation
cyber attack occurrences
cyber defense
forecasting
incident count forecasting
intrusion detection methods
malicious activity
Malicious Traffic
malware
Metrics
potential external factors
Predictive models
predictive security metrics
pubcrawl
security
target configuration
time series
Time series analysis
time series construction
Uniform resource locators
biblio
An Emerging Application Centric RFID Framework Based on New Web Technology
Submitted by
grigby1
on Wed, 10/02/2019 - 2:02pm
antennas
Databases
framework
Human behavior
Human Factors
internet
IoT
Protocols
pubcrawl
radiofrequency identification
resilience
Resiliency
REST protocols
RFID
RFID framework
RFID tags
RFIDs
Servers
telecommunication security
Uniform resource locators
Web technology
biblio
Demonstrating Different Phishing Attacks Using Fuzzy Logic
Submitted by
grigby1
on Wed, 05/01/2019 - 10:29am
bank account details
Bars
Classification algorithms
Computer crime
Data mining
Defuzzification
Electronic mail
Fraudulent
fraudulent websites
Fuzzy logic
global security
indexing
legitimate websites
malicious website
Membership functions
Metrics
online banking passwords
pagerank
Phishing
phishing attacks
Phishing Detection
phishing sites
pubcrawl
resilience
Resiliency
security
security of data
Uniform resource locators
unsolicited e-mail
Web sites
biblio
Impact Assessment of Password Reset PRMitM Attack with Two-Factor Authentication
Submitted by
grigby1
on Fri, 02/08/2019 - 3:34pm
authentication
Human behavior
Human Factors
LinkedIn
password
PRMitM
pubcrawl
Registers
two factor authentication
two-factor authentication
Uniform resource locators
biblio
Malicious browser extensions: A growing threat: A case study on Google Chrome: Ongoing work in progress
Submitted by
grigby1
on Wed, 01/16/2019 - 1:32pm
affiliate fraud
attack possibilities
attacks
browser extension
browser extension platform
Browsers
Compositionality
Computer crime
current browsers
Electronic mail
fraud
Google Chrome
Human behavior
internet
malicious browser extension
malicious browser extensions
Metrics
online front-ends
party developers
payment frauds
Phishing
popular browser
pubcrawl
Resiliency
security of data
Servers
spying
traditional functionalities
Uniform resource locators
unsolicited e-mail
Videos
Web Browser Security
Web pages
biblio
Identifying Email Threats Using Predictive Analysis
Submitted by
grigby1
on Wed, 05/09/2018 - 1:54pm
Analytical models
attackers
collaboration
composability
Computer crime
Electronic mail
email threat identification
feature extraction
invasive software
learning (artificial intelligence)
machine learning algorithms
machine learning model
malicious emails
malware
malware attachment
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
predictive analysis approach
Predictive models
pubcrawl
Random Forest
sandboxing
static analysis
Support vector machines
targeted attacks
Uniform resource locators
unseen emails
unsolicited e-mail
URL
biblio
Detecting DOM-Sourced Cross-Site Scripting in Browser Extensions
Submitted by
grigby1
on Thu, 02/15/2018 - 10:44am
abstract syntax tree parser
application program interfaces
browser extension vulnerability
browser extensions
Browsers
client-side vulnerabilities
computational linguistics
Cross Site Scripting
Cross Site Scripting (XSS)
Document Object Model
DOM-sourced cross-site scripting detection
DOM-sourced XSS
dynamic symbolic execution
HTML documents
HTML5 API
Human behavior
human factor
Human Factors
hypermedia markup languages
internet
Java
JavaScript
JavaScript engines
metadata
online front-ends
program diagnostics
program testing
pubcrawl
resilience
Resiliency
Scalability
security of data
shadow DOM
static analysis
text analysis
text filter
trees (mathematics)
Uniform resource locators
web applications
Web pages
web security
XSS vulnerabilities
1
2
3
4
next ›
last »