منابع مشابه
fMRI in an oddball task: effects of target-to-target interval.
The amplitude of the P3 event-related potential (ERP) elicited by task-relevant target ("oddball") stimuli has been shown to vary in proportion to the length of time between targets. Here we use functional magnetic resonance imaging (fMRI) to identify neural systems modulated by target interval in a large sample of healthy adults (n=100) during performance of an auditory oddball task that inclu...
متن کاملLearning to Detect
Malicious Web sites are a cornerstone of Internet criminal activities. The dangers of these sites have created a demand for safeguards that protect end-users from visiting them. This article explores how to detect malicious Web sites from the lexical and host-based features of their URLs. We show that this problem lends itself naturally to modern algorithms for online learning. Online algorithm...
متن کاملLearning to Detect Change
People, across a wide range of personal and professional domains, need to detect change accurately. Previous research has documented systematic shortcomings in doing so, in particular, a pattern of overand underreaction to indications of change, resulting from a tendency to overweight signals of change at the expense of the environment that produces the signals. This investigation considers whe...
متن کاملLEARNING TO DETECT PHISHING URLs
Phishing attacks have been on the rise and performing certain actions such as mouse hovering, clicking, etc. on malicious URLs may cause unsuspecting Internet users to fall victims of identity theft or other scams. In this paper, we study the anatomy of phishing URLs that are created with the specific intent of impersonating a trusted third party to trick users into divulging personal data. Unl...
متن کاملLearning to Detect Phishing Webpages
Phishing has become a lucrative business for cyber criminals whose victims range from end users to large corporations and government organizations. Though Internet users are generally becoming more aware of phishing websites, cyber scammers come up with novel schemes that circumvent phishing filters and often succeed in fooling even savvy users. Recent studies to detect phishing and malicious w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2018
ISSN: 0018-9448,1557-9654
DOI: 10.1109/tit.2017.2778264