Liu et al., 2011 - Google Patents
Smartening the crowds: computational techniques for improving human verification to fight phishing scamsLiu et al., 2011
View PDF- Document ID
- 2485270985683110580
- Author
- Liu G
- Xiang G
- Pendleton B
- Hong J
- Liu W
- Publication year
- Publication venue
- Proceedings of the seventh symposium on usable privacy and security
External Links
Snippet
Phishing is an ongoing kind of semantic attack that tricks victims into inadvertently sharing sensitive information. In this paper, we explore novel techniques for combating the phishing problem using computational techniques to improve human effort. Using tasks posted to the …
- 238000000034 method 0 title abstract description 31
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | Smartening the crowds: computational techniques for improving human verification to fight phishing scams | |
Apruzzese et al. | “real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice | |
Pacheco et al. | Uncovering coordinated networks on social media: methods and case studies | |
Legg et al. | Automated insider threat detection system using user and role-based profile assessment | |
Flores et al. | Shaping intention to resist social engineering through transformational leadership, information security culture and awareness | |
Gervais et al. | Quantifying web-search privacy | |
CN104077396B (en) | Method and device for detecting phishing website | |
Huh et al. | Phishing detection with popular search engines: Simple and effective | |
Das et al. | Manipulation among the arbiters of collective intelligence: How Wikipedia administrators mold public opinion | |
JP2020508518A (en) | How to determine the authenticity of news | |
CN101971591A (en) | System and method of analyzing web addresses | |
Yamak et al. | Detection of multiple identity manipulation in collaborative projects | |
AlShboul et al. | A visualization cybersecurity method based on features' dissimilarity | |
Tanaka et al. | Bot detection model using user agent and user behavior for web log analysis | |
Robertson et al. | Darknet mining and game theory for enhanced cyber threat intelligence | |
Dunna et al. | Paying Attention to the Algorithm Behind the Curtain: Bringing Transparency to YouTube's Demonetization Algorithms | |
Petersen | Data mining for network intrusion detection: A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks | |
Siddiqui et al. | Bot or not | |
Das et al. | Smartphone fingerprinting via motion sensors: Analyzing feasibility at large-scale and studying real usage patterns | |
Rajab | Visualisation model based on phishing features | |
Singh et al. | An analytical model for identifying suspected users on Twitter | |
US20220383142A1 (en) | System and method for machine learning based prediction of social media influence operations | |
King et al. | Lying about lying on social media: a case study of the 2019 Canadian Elections | |
Xiang | Toward a phish free world: A feature-type-aware cascaded learning framework for phish detection | |
Júnior et al. | Time-aware ranking in sport social networks |