A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Intelligent web-phishing detection and protection scheme using integrated features of Images, frames and text
2019
Expert systems with applications
In recent years, phishing attacks continue to escalate in frequency, severity and impact. ...
Several solutions, using various methodologies, have been proposed in the literature to counter the web-phishing threats. ...
Addressing this situation, Barraclough et al. (2013) proposed a robust model using neuro-fuzzy with few inputs. This model employs fuzzy logic in combination with a neural network. ...
doi:10.1016/j.eswa.2018.07.067
fatcat:crwgj3ra5jdkpaurs7wfaggryq
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
2022
IEEE Access
We study the key research areas in phishing email detection using NLP, machine learning algorithms used in phishing detection email, text features in phishing emails, datasets and resources that have been ...
used in phishing emails, and the evaluation criteria. ...
The same situation is seen with the ErR metric and in this plan, the preferential values should be the confusion matrix, ROC, and AUC. ...
doi:10.1109/access.2022.3183083
fatcat:4tdykzzjvzh4vhvtjvbebbszyu
QoS and energy management with Petri nets: A self-adaptive framework
2012
Journal of Systems and Software
Stochastic Petri Nets are proposed for the modeling of the framework concerns, their analyses give results about the trade-offs. ...
Energy use is becoming a key design consideration in computing infrastructures and services. ...
For the computation of applications response time, Mistral, as well as our approach, relies on formal models, in this case queuing networks instead of Petri nets. ...
doi:10.1016/j.jss.2012.04.077
fatcat:hxc34gjbbja4ff746wgjkyprpu
A Comprehensive Overview on Cybersecurity: Threats and Attacks
2021
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
The statistics about cyber crime tell that as of 2021 January, google has registered around 2 million phishing websites. ...
With the increased use of technologies in our life, the cybercrimes have amplified. ...
ACKNOWLEDGMENT The authors would like to acknowledge BMS college of Engineering and TEQIP III phase for their immense support in carrying out and encouraging this research work. ...
doi:10.35940/ijitee.h9242.0610821
fatcat:s46wfv2e4ffcjm53cjwqznk43e
A Survey on Human and Personality Vulnerability Assessment in Cyber-security: Challenges, Approaches, and Open Issues
[article]
2021
arXiv
pre-print
Among them, Human Vulnerability Assessment has been included in various frameworks aiming to assess the cyber security capacity of organizations, but it concerns a one time assessment rather than a continuous ...
Results suggested that heuristic information-processing is highly associated with susceptibility to phishing in social networks. ...
In the context of raising phishing awareness, training programs would be more effective in cases where the simulated attack resembles real-life situations. ...
arXiv:2106.09986v2
fatcat:rurgrvdkjbcljiqoiv3ztoov4u
Binary Classification in Unstructured Space With Hypergraph Case-Based Reasoning
[article]
2019
arXiv
pre-print
Binary classification is one of the most common problem in machine learning. It consists in predicting whether a given element belongs to a particular class. ...
In this paper, a new algorithm for binary classification is proposed using a hypergraph representation. ...
Jean-François Puget, IBM Analytics, for his useful suggestions and advice in order to improve this paper. ...
arXiv:1806.06232v3
fatcat:27l5y5bqhjhxxizvq44t7ljrcq
Average Number of Spear-Phishing Attacks Per Day
2013
Trends
unpublished
The net total number of attacks blocked in 2013 is broken down by industry in figure 4 and organization size in figure 5. ...
Skeptic™, the Symantec.cloud proprietary heuristic technology, is able to detect new and sophisticated targeted threats before they reach customers' networks. ...
In the case of spear phishing, we simply substitute "afflicted with a disease" for "received at least one spear-phishing email in 2013."
About Symantec More Information ...
fatcat:snkumebqlbgyxosubbuk43ujrm
Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey
[article]
2020
arXiv
pre-print
We are living in an era when online communication over social network services (SNSs) have become an indispensable part of people's everyday lives. ...
In this paper, we conducted an extensive survey, covering (i) the multidisciplinary concepts of social deception; (ii) types of OSD attacks and their unique characteristics compared to other social network ...
, heuristics and moderation based
phishing prevention platform
Number of moderators, availability of moderators, unanim-
ity of decision, network resources
Simulated data
[61]
Fake profile
Proactive ...
arXiv:2004.07678v1
fatcat:k4a6siywefb6lhkmyn67lmoqwe
AN ENHANCEMENT ON TARGETED PHISHING ATTACKS IN THE STATE OF QATAR
2021
This novel enterprise-wide email phishing detection system has been used by organisations and individuals not only in the state of Qatar but also in organisations in the UK. ...
Since the Qatari economy has grown exponentially and become increasingly global in nature, email phishing and targeted phishing attacks have the capacity to be devastating to the Qatari economy, yet there ...
proposed a classifier to detect phishing emails using hybrid features. ...
doi:10.24377/ljmu.t.00011837
fatcat:s3ecq4zenjghniewsfnz37c2ca
Emerging Cyber Security Challenges after COVID Pandemic: A Survey
2022
Journal of Internet Services and Information Security
To prevent rampant cyber crimes in such situations, we have also discussed future generation solutions to tackle such issues so that critical systems and procedural checks must be in place. ...
In 2019, a virus infection, COVID-19, traveled across the oceans, gained foothold in many countries, and started infecting the citizens of those countries. ...
Many meta-heuristic approaches are suggested for this, like a hybrid particle swarm optimization algorithm explicitly designed to enhance APT detection [89] . ...
doi:10.22667/jisis.2022.05.31.021
dblp:journals/jisis/ChoudharyCPKLD22
fatcat:ofqkqovmpfev7i7opgvu2mfcv4
Power system restoration: a literature review from 2006 to 2016
2016
Journal of Modern Power Systems and Clean Energy
Research progress of the power system restoration from 2006 to 2016 is reviewed in this paper, including black-start, network reconfiguration and load restoration. ...
However, rapidly developing artificial intelligence technology will eventually enable the step-by-step dynamic decision-making based on the situation awareness of supervisory control and data acquisition ...
and the target network into account in the network reconfiguration phase. ...
doi:10.1007/s40565-016-0219-2
fatcat:cnbp2vegtfbqzo4sjqamdtrcva
Machine Learning Use Cases in Cybersecurity
2019
Proceedings of the Institute for System Programming of RAS
The problem regarding the use of machine learning in cybersecurity is difficult to solve because the advances in the field offer many opportunities that it is challenging to find exceptional and beneficial ...
The goal of this paper to explore machine learning usage in cybersecurity and cyberattack and provide a model of machine learning-powered attack. ...
In fact, 71% of US businesses plan to use ML in their cybersecurity tools in 2019 [3] as over one-third (36%) [3] of organizations experienced damaging cyberattacks in 2018. ...
doi:10.15514/ispras-2019-31(5)-15
fatcat:dfnfslb4hffvrlmb65gkvrtrsm
REVIEW ON COMPUTE AUGMENTATION TECHNIQUES IN MOBILE CLOUD COMPUTING
2018
International Journal of Advanced Research in Computer Science
the specific site as a unit) and hybrid level (partitions of different granularity). ...
It uses min-cut algorithm with FM heuristic for partitioning the graph. ...
doi:10.26483/ijarcs.v9i2.5767
fatcat:cn7s5h3i3vatbbjfq2z7gnuqky
Multi-grid cellular genetic algorithm for optimizing variable ordering of ROBDDs
2012
2012 IEEE Congress on Evolutionary Computation
The approach systematically produces better results than the used basic genetic algorithm and better or similar results with other heuristic methods. ...
The population evolves on a bidimensional grid and is implicitly organized in geographical clusters that present a form of structural similarity between individuals. ...
Simple methods can be found in [3] and [4] . A specialized local search technique, called "the sifting heuristic" is described in [5] , the simulated annealing heuristic is used in [6] . ...
doi:10.1109/cec.2012.6256590
dblp:conf/cec/RotaruB12
fatcat:4ly3nrktw5habc6lf5err7d5py
The current state of fake news: challenges and opportunities
2017
Procedia Computer Science
In this paper, we discuss the problem by presenting the proposals into categories: content based, source based and diffusion based. ...
On social networks, the reach and effects of information spread occur at such a fast pace and so amplified that distorted, inaccurate or false information acquires a tremendous potential to cause real ...
Heuristic methods are being developed to face this issue, by proposing an algorithm that can efficiently approximate linkage information based on the times at which specific URLs appear in a network of ...
doi:10.1016/j.procs.2017.11.106
fatcat:etf72g7qazgytftcbf25gsn3by
« Previous
Showing results 1 — 15 out of 217 results