Nothing Special   »   [go: up one dir, main page]

Liu et al., 2011 - Google Patents

Smartening the crowds: computational techniques for improving human verification to fight phishing scams

Liu et al., 2011

View PDF
Document ID
2485270985683110580
Author
Liu G
Xiang G
Pendleton B
Hong J
Liu W
Publication year
Publication venue
Proceedings of the seventh symposium on usable privacy and security

External Links

Snippet

Phishing is an ongoing kind of semantic attack that tricks victims into inadvertently sharing sensitive information. In this paper, we explore novel techniques for combating the phishing problem using computational techniques to improve human effort. Using tasks posted to the …
Continue reading at kilthub.cmu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00281Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Similar Documents

Publication Publication Date Title
Liu et al. Smartening the crowds: computational techniques for improving human verification to fight phishing scams
Apruzzese et al. “real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice
Pacheco et al. Uncovering coordinated networks on social media: methods and case studies
Legg et al. Automated insider threat detection system using user and role-based profile assessment
Flores et al. Shaping intention to resist social engineering through transformational leadership, information security culture and awareness
Gervais et al. Quantifying web-search privacy
CN104077396B (en) Method and device for detecting phishing website
Huh et al. Phishing detection with popular search engines: Simple and effective
Das et al. Manipulation among the arbiters of collective intelligence: How Wikipedia administrators mold public opinion
JP2020508518A (en) How to determine the authenticity of news
CN101971591A (en) System and method of analyzing web addresses
Yamak et al. Detection of multiple identity manipulation in collaborative projects
AlShboul et al. A visualization cybersecurity method based on features' dissimilarity
Tanaka et al. Bot detection model using user agent and user behavior for web log analysis
Robertson et al. Darknet mining and game theory for enhanced cyber threat intelligence
Dunna et al. Paying Attention to the Algorithm Behind the Curtain: Bringing Transparency to YouTube's Demonetization Algorithms
Petersen Data mining for network intrusion detection: A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks
Siddiqui et al. Bot or not
Das et al. Smartphone fingerprinting via motion sensors: Analyzing feasibility at large-scale and studying real usage patterns
Rajab Visualisation model based on phishing features
Singh et al. An analytical model for identifying suspected users on Twitter
US20220383142A1 (en) System and method for machine learning based prediction of social media influence operations
King et al. Lying about lying on social media: a case study of the 2019 Canadian Elections
Xiang Toward a phish free world: A feature-type-aware cascaded learning framework for phish detection
Júnior et al. Time-aware ranking in sport social networks