Zobrazeno 1 - 10
of 137
pro vyhledávání: '"Sanchari Das"'
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 2, Iss 2, Pp 329-357 (2022)
The World Wide Web (www) consists of the surface web, deep web, and Dark Web, depending on the content shared and the access to these network layers. Dark Web consists of the Dark Net overlay of networks that can be accessed through specific software
Externí odkaz:
https://doaj.org/article/48f50f7489bf40769ec24efe98b04356
Autor:
Sunny Shrestha, Sanchari Das
Publikováno v:
Frontiers in Artificial Intelligence, Vol 5 (2022)
Automated systems that implement Machine learning (ML) and Artificial Intelligence (AI) algorithms present promising solutions to a variety of technological and non-technological issues. Although, industry leaders are rapidly adopting these systems f
Externí odkaz:
https://doaj.org/article/e9ee845fc3c8423ba339bfef12e982a2
Autor:
Tazi, Faiza1 (AUTHOR) faiza.tazi@du.edu, Dykstra, Josiah2 (AUTHOR) josiah@designersecurity.com, Rajivan, Prashanth3 (AUTHOR) prajivan@uw.edu, Chalil Madathil, Kapil4 (AUTHOR) kmadath@clemson.edu, Hughart, Jiovanne5 (AUTHOR) abizwhiz@icloud.com, McElligott, James6 (AUTHOR) mcellig@musc.edu, Votipka, Daniel7 (AUTHOR) dvotipka@cs.tufts.edu, Das, Sanchari8 (AUTHOR) Sanchari.Das@du.edu
Publikováno v:
Communications of the ACM. Sep2024, Vol. 67 Issue 9, p27-30. 4p.
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2023:138-153
Privacy policies outline data collection and sharing practices followed by an organization, together with choice and control measures available to users to manage the process. However, users have often needed help reading and understanding such docum
Publikováno v:
Proceedings of the ACM on Human-Computer Interaction. 7:1-27
Phishing attacks, in which deceptive messages purporting to be from a legitimate contact are used to trick recipients and acquire sensitive information for the purposes of committing fraud, are a substantial and growing problem for organizations. IT
Publikováno v:
Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 66:2093-2097
Phishing poses a major security risk to organizations and individuals leading to loss of billions of dollars yearly. While risk communication serves as a tool to mitigate phishing attempts, it is imperative to create automated phishing detection tool
Autor:
Sanchari Das, Kapil Madathil, Josiah Dykstra, Prashanth Rajivan, Shubha Setty, James T. McElligott, Jiovanne Hughart, Daniel Votipka
Publikováno v:
Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 66:1524-1528
Telehealth technologies have aided in the distribution of health-related services, especially during the COVID-19 pandemic. With increased telehealth use, privacy risks and security concerns among healthcare providers and patients have subsequently i
Publikováno v:
Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 66:465-469
COVID-19 has impacted various sectors of everyday living, including the education sector. Due to the pandemic, the educational institutions everywhere were forced to switch to the online platform as per CDC guidelines. However, the transition and ada
The General Data Protection Regulation (GDPR) in the European Union contains directions on how user data may be collected, stored, and when it must be deleted. As similar legislation is developed around the globe, there is the potential for repercuss
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::12b64bc7af8f46307626c1a76dbf8c73
Autor:
Faiza Tazi, Suleiman Saka, Griffin Opp, Shradha Neupane, Sanchari Das, Lorenzo De Carli, Indrakshi Ray
Publikováno v:
Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems.