منابع مشابه
Detecting Phishing E-mails by Heterogeneous Classification
This paper presents a system for classifying e-mails into two categories, legitimate and fraudulent. This classifier system is based on the serial application of three filters: a Bayesian filter that classifies the textual content of e-mails, a rulebased filter that classifies the non grammatical content of e-mails and, finally, a filter based on an emulator of fictitious accesses which classif...
متن کاملVictimized by Phishing: A Heuristic-Systematic Perspective
Phishing has become an ever-present, ever-increasing threat to information security, yet theory-based, systematic research on the behavioral aspect of this phenomenon is rather limited. In this paper, we propose the Heuristic-Systematic Model (HSM) as an overarching theory to solidify the theory base for this line of research. We note the theoretical synergy between HSM and other theories used ...
متن کاملMisconduct by researchers and authors.
Most scientific research is conducted properly and reported honestly but a few authors invent or manipulate data to reach fraudulent conclusions. Other types of misconduct include deliberately providing incomplete or improperly processed data, failure to follow ethical procedures, failure to obtain informed consent, breach of patient confidentiality, improper award or denial of authorship, fail...
متن کاملPeer Reviewers’ Comments on Research Articles Submitted by Iranian Researchers
The invisible hands of peer reviewers play a determining role in the eventual fate of submissions to international English-medium journals. This study builds on the assumption that non-native researchers and prospective academic authors may find the whole strive for publication, and more specifically, the tough review process, less threatening if they are aware of journal reviewers’ expectation...
متن کاملSocial Phishing
Email spam: unsolicited emails for the purpose of advertisement or committing fraud. Phishing: electronic fraud based on social engineering. Phisher: fraudsters who commit phishing crimes. Phishing site: web sites created by phishers to steal sensitive information from users. Anti-phishing: efforts taken from multiple perspectives to combat phishing crimes. Machine learning: the design and deve...
متن کاملAn interdiscplinary study of phishing and spear-phishing attacks
In a world where spear-phishing is one of the most common attacks used to steal confidential data, it is necessary to instruct technical and non-technical users about new mechanisms attackers can use to generate these attacks. We want to focus on phishing attacks, where a social engineer communicates a deceitful message to their victims in order to obtain some confidential information, because ...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
razavi international journal of medicineجلد ۴، شماره ۳، صفحات ۰-۰
کلمات کلیدی
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023