A new direction in social network analysis: Online social network analysis problems and applications
The use of online social networks has made significant progress in recent years as the use
of the Internet has become widespread worldwide as the technological infrastructure and the …
of the Internet has become widespread worldwide as the technological infrastructure and the …
Phishing environments, techniques, and countermeasures: A survey
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …
web, mobile, and social networking technologies. Previous phishing taxonomies have …
Malicious URL detection using machine learning: A survey
Malicious URL, aka malicious website, is a common and serious threat to cybersecurity.
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …
Detection of malicious web activity in enterprise computer networks
A processing device in one embodiment comprises a processor coupled to a memory and is
configured to obtain internal log data of a computer network of an enterprise, to extract …
configured to obtain internal log data of a computer network of an enterprise, to extract …
Automating fake news detection system using multi-level voting model
The issues of online fake news have attained an increasing eminence in the diffusion of
shaping news stories online. Misleading or unreliable information in the form of videos …
shaping news stories online. Misleading or unreliable information in the form of videos …
Faking sandy: characterizing and identifying fake images on twitter during hurricane sandy
In today's world, online social media plays a vital role during real world events, especially
crisis events. There are both positive and negative effects of social media coverage of …
crisis events. There are both positive and negative effects of social media coverage of …
[PDF][PDF] Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale
Despite an extensive anti-phishing ecosystem, phishing attacks continue to capitalize on
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …
An investigation of phishing awareness and education over time: When and how to best remind users
Security awareness and education programmes are rolled out in more and more
organisations. However, their effectiveness over time and, correspondingly, appropriate …
organisations. However, their effectiveness over time and, correspondingly, appropriate …
SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists
Due to their ubiquity in modern web browsers, anti-phishing blacklists are a key defense
against large-scale phishing attacks. However, sophistication in phishing websites—such as …
against large-scale phishing attacks. However, sophistication in phishing websites—such as …