217 Hits in 5.0 sec

Intelligent web-phishing detection and protection scheme using integrated features of Images, frames and text

M.A. Adebowale, K.T. Lwin, E. Sánchez, M.A. Hossain
2019 Expert systems with applications  
In recent years, phishing attacks continue to escalate in frequency, severity and impact.  ...  Several solutions, using various methodologies, have been proposed in the literature to counter the web-phishing threats.  ...  Addressing this situation, Barraclough et al. (2013) proposed a robust model using neuro-fuzzy with few inputs. This model employs fuzzy logic in combination with a neural network.  ... 
doi:10.1016/j.eswa.2018.07.067 fatcat:crwgj3ra5jdkpaurs7wfaggryq

A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques

Said Salloum, Tarek Gaber, Sunil Vadera, Khaled Shaalan
2022 IEEE Access  
We study the key research areas in phishing email detection using NLP, machine learning algorithms used in phishing detection email, text features in phishing emails, datasets and resources that have been  ...  used in phishing emails, and the evaluation criteria.  ...  The same situation is seen with the ErR metric and in this plan, the preferential values should be the confusion matrix, ROC, and AUC.  ... 
doi:10.1109/access.2022.3183083 fatcat:4tdykzzjvzh4vhvtjvbebbszyu

QoS and energy management with Petri nets: A self-adaptive framework

Diego Perez-Palacin, Raffaela Mirandola, José Merseguer
2012 Journal of Systems and Software  
Stochastic Petri Nets are proposed for the modeling of the framework concerns, their analyses give results about the trade-offs.  ...  Energy use is becoming a key design consideration in computing infrastructures and services.  ...  For the computation of applications response time, Mistral, as well as our approach, relies on formal models, in this case queuing networks instead of Petri nets.  ... 
doi:10.1016/j.jss.2012.04.077 fatcat:hxc34gjbbja4ff746wgjkyprpu

A Comprehensive Overview on Cybersecurity: Threats and Attacks

Preetha S, P. Lalasa, Pradeepa R
The statistics about cyber crime tell that as of 2021 January, google has registered around 2 million phishing websites.  ...  With the increased use of technologies in our life, the cybercrimes have amplified.  ...  ACKNOWLEDGMENT The authors would like to acknowledge BMS college of Engineering and TEQIP III phase for their immense support in carrying out and encouraging this research work.  ... 
doi:10.35940/ijitee.h9242.0610821 fatcat:s46wfv2e4ffcjm53cjwqznk43e

A Survey on Human and Personality Vulnerability Assessment in Cyber-security: Challenges, Approaches, and Open Issues [article]

Dimitra Papatsaroucha, Yannis Nikoloudakis, Ioannis Kefaloukos, Evangelos Pallis, Evangelos K. Markakis
2021 arXiv   pre-print
Among them, Human Vulnerability Assessment has been included in various frameworks aiming to assess the cyber security capacity of organizations, but it concerns a one time assessment rather than a continuous  ...  Results suggested that heuristic information-processing is highly associated with susceptibility to phishing in social networks.  ...  In the context of raising phishing awareness, training programs would be more effective in cases where the simulated attack resembles real-life situations.  ... 
arXiv:2106.09986v2 fatcat:rurgrvdkjbcljiqoiv3ztoov4u

Binary Classification in Unstructured Space With Hypergraph Case-Based Reasoning [article]

Alexandre Quemy
2019 arXiv   pre-print
Binary classification is one of the most common problem in machine learning. It consists in predicting whether a given element belongs to a particular class.  ...  In this paper, a new algorithm for binary classification is proposed using a hypergraph representation.  ...  Jean-François Puget, IBM Analytics, for his useful suggestions and advice in order to improve this paper.  ... 
arXiv:1806.06232v3 fatcat:27l5y5bqhjhxxizvq44t7ljrcq

Average Number of Spear-Phishing Attacks Per Day

2013 Trends   unpublished
The net total number of attacks blocked in 2013 is broken down by industry in figure 4 and organization size in figure 5.  ...  Skeptic™, the proprietary heuristic technology, is able to detect new and sophisticated targeted threats before they reach customers' networks.  ...  In the case of spear phishing, we simply substitute "afflicted with a disease" for "received at least one spear-phishing email in 2013." About Symantec More Information  ... 

Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey [article]

Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra
2020 arXiv   pre-print
We are living in an era when online communication over social network services (SNSs) have become an indispensable part of people's everyday lives.  ...  In this paper, we conducted an extensive survey, covering (i) the multidisciplinary concepts of social deception; (ii) types of OSD attacks and their unique characteristics compared to other social network  ...  , heuristics and moderation based phishing prevention platform Number of moderators, availability of moderators, unanim- ity of decision, network resources Simulated data [61] Fake profile Proactive  ... 
arXiv:2004.07678v1 fatcat:k4a6siywefb6lhkmyn67lmoqwe


Y Al-Hamar
This novel enterprise-wide email phishing detection system has been used by organisations and individuals not only in the state of Qatar but also in organisations in the UK.  ...  Since the Qatari economy has grown exponentially and become increasingly global in nature, email phishing and targeted phishing attacks have the capacity to be devastating to the Qatari economy, yet there  ...  proposed a classifier to detect phishing emails using hybrid features.  ... 
doi:10.24377/ljmu.t.00011837 fatcat:s3ecq4zenjghniewsfnz37c2ca

Emerging Cyber Security Challenges after COVID Pandemic: A Survey

Arjun Choudhary, Gaurav Choudhary, Kapil Pareek, Chetanya Kunndra, Jatin Luthra, Nicola Dragon
2022 Journal of Internet Services and Information Security  
To prevent rampant cyber crimes in such situations, we have also discussed future generation solutions to tackle such issues so that critical systems and procedural checks must be in place.  ...  In 2019, a virus infection, COVID-19, traveled across the oceans, gained foothold in many countries, and started infecting the citizens of those countries.  ...  Many meta-heuristic approaches are suggested for this, like a hybrid particle swarm optimization algorithm explicitly designed to enhance APT detection [89] .  ... 
doi:10.22667/jisis.2022.05.31.021 dblp:journals/jisis/ChoudharyCPKLD22 fatcat:ofqkqovmpfev7i7opgvu2mfcv4

Power system restoration: a literature review from 2006 to 2016

Yutian LIU, Rui FAN, Vladimir TERZIJA
2016 Journal of Modern Power Systems and Clean Energy  
Research progress of the power system restoration from 2006 to 2016 is reviewed in this paper, including black-start, network reconfiguration and load restoration.  ...  However, rapidly developing artificial intelligence technology will eventually enable the step-by-step dynamic decision-making based on the situation awareness of supervisory control and data acquisition  ...  and the target network into account in the network reconfiguration phase.  ... 
doi:10.1007/s40565-016-0219-2 fatcat:cnbp2vegtfbqzo4sjqamdtrcva

Machine Learning Use Cases in Cybersecurity

S.М. Avdoshin, A.В. Lazarenko, N.I. Chichileva, P.А. Naumov, P.G. Klyucharev
2019 Proceedings of the Institute for System Programming of RAS  
The problem regarding the use of machine learning in cybersecurity is difficult to solve because the advances in the field offer many opportunities that it is challenging to find exceptional and beneficial  ...  The goal of this paper to explore machine learning usage in cybersecurity and cyberattack and provide a model of machine learning-powered attack.  ...  In fact, 71% of US businesses plan to use ML in their cybersecurity tools in 2019 [3] as over one-third (36%) [3] of organizations experienced damaging cyberattacks in 2018.  ... 
doi:10.15514/ispras-2019-31(5)-15 fatcat:dfnfslb4hffvrlmb65gkvrtrsm


V. Suganya
2018 International Journal of Advanced Research in Computer Science  
the specific site as a unit) and hybrid level (partitions of different granularity).  ...  It uses min-cut algorithm with FM heuristic for partitioning the graph.  ... 
doi:10.26483/ijarcs.v9i2.5767 fatcat:cn7s5h3i3vatbbjfq2z7gnuqky

Multi-grid cellular genetic algorithm for optimizing variable ordering of ROBDDs

Cristian Rotaru, Octav Brudaru
2012 2012 IEEE Congress on Evolutionary Computation  
The approach systematically produces better results than the used basic genetic algorithm and better or similar results with other heuristic methods.  ...  The population evolves on a bidimensional grid and is implicitly organized in geographical clusters that present a form of structural similarity between individuals.  ...  Simple methods can be found in [3] and [4] . A specialized local search technique, called "the sifting heuristic" is described in [5] , the simulated annealing heuristic is used in [6] .  ... 
doi:10.1109/cec.2012.6256590 dblp:conf/cec/RotaruB12 fatcat:4ly3nrktw5habc6lf5err7d5py

The current state of fake news: challenges and opportunities

Álvaro Figueira, Luciana Oliveira
2017 Procedia Computer Science  
In this paper, we discuss the problem by presenting the proposals into categories: content based, source based and diffusion based.  ...  On social networks, the reach and effects of information spread occur at such a fast pace and so amplified that distorted, inaccurate or false information acquires a tremendous potential to cause real  ...  Heuristic methods are being developed to face this issue, by proposing an algorithm that can efficiently approximate linkage information based on the times at which specific URLs appear in a network of  ... 
doi:10.1016/j.procs.2017.11.106 fatcat:etf72g7qazgytftcbf25gsn3by
« Previous Showing results 1 — 15 out of 217 results