Zobrazeno 1 - 10
of 205
pro vyhledávání: '"Jones, Keith S."'
Cyber attacks continue to pose significant threats to individuals and organizations, stealing sensitive data such as personally identifiable information, financial information, and login credentials. Hence, detecting malicious websites before they ca
Externí odkaz:
http://arxiv.org/abs/2404.09802
Autor:
Abri, Faranak, Gutierrez, Luis Felipe, Kulkarni, Chaitra T., Namin, Akbar Siami, Jones, Keith S.
To understand how end-users conceptualize consequences of cyber security attacks, we performed a card sorting study, a well-known technique in Cognitive Sciences, where participants were free to group the given consequences of chosen cyber attacks in
Externí odkaz:
http://arxiv.org/abs/2106.01998
Autor:
Gutiérrez, Luis Felipe, Abri, Faranak, Armstrong, Miriam, Namin, Akbar Siami, Jones, Keith S.
The problem of detecting phishing emails through machine learning techniques has been discussed extensively in the literature. Conventional and state-of-the-art machine learning algorithms have demonstrated the possibility of building classifiers wit
Externí odkaz:
http://arxiv.org/abs/2012.14488
Autor:
Abri, Faranak, Gutiérrez, Luis Felipe, Namin, Akbar Siami, Sears, David R. W., Jones, Keith S.
Sonification is the science of communication of data and events to users through sounds. Auditory icons, earcons, and speech are the common auditory display schemes utilized in sonification, or more specifically in the use of audio to convey informat
Externí odkaz:
http://arxiv.org/abs/2012.02643
Cyber-physical systems posit a complex number of security challenges due to interconnection of heterogeneous devices having limited processing, communication, and power capabilities. Additionally, the conglomeration of both physical and cyber-space f
Externí odkaz:
http://arxiv.org/abs/2012.00648
Autor:
Abri, Faranak, Gutierrez, Luis Felipe, Namin, Akbar Siami, Jones, Keith S., Sears, David R. W.
Online reviews play an integral part for success or failure of businesses. Prior to purchasing services or goods, customers first review the online comments submitted by previous customers. However, it is possible to superficially boost or hinder som
Externí odkaz:
http://arxiv.org/abs/2010.04260
Autor:
Gutierrez-Espinoza, Luis, Abri, Faranak, Namin, Akbar Siami, Jones, Keith S., Sears, David R. W.
Customers represent their satisfactions of consuming products by sharing their experiences through the utilization of online reviews. Several machine learning-based approaches can automatically detect deceptive and fake reviews. Recently, there have
Externí odkaz:
http://arxiv.org/abs/2006.07912
We present an exploratory study of responses from $75$ security professionals and ethical hackers in order to understand how they abuse cloud platforms for attack purposes. The participants were recruited at the Black Hat and DEF CON conferences. We
Externí odkaz:
http://arxiv.org/abs/2006.07914
Cloud computing offers users scalable platforms and low resource cost. At the same time, the off-site location of the resources of this service model makes it more vulnerable to certain types of adversarial actions. Cloud computing has not only gaine
Externí odkaz:
http://arxiv.org/abs/2006.07908