Showing 81 - 100 results of 341 for search '"Phish"', query time: 0.16s Refine Results
  1. 81

    Managing Mission - Critical Domains and DNS : Demystifying Nameservers, DNS, and Domain Names. by Jeftovic, Mark

    Birmingham : Packt Publishing Ltd, 2018
    Table of Contents: “…Domain policies you must be aware ofThe Whois Accuracy Program (WAP); Incorrect or bad Whois reports; Domain slamming; Phishing; Email phishing (spearphishing); Web phishing; Unintentional expiry; Search engine/trademark registrations; Domain scams; The Foreign Infringer scam; Buy-side scam; Sell-side scams; DNS failures; Summary; References; Chapter 5: A Tale of Two Nameservers; Introducing resolvers; Differences between stub resolvers, caching resolvers, and full resolvers; Stub resolvers; Caching resolvers; Full resolvers; Negative caches; Authoritative nameservers; Primary Nameserver.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  2. 82

    Enabling Machine Learning Applications in Data Science Proceedings of Arab Conference for Emerging Technologies 2020

    Singapore : Springer Singapore : Imprint: Springer, 2021
    1st ed. 2021.
    Table of Contents: “…Who is Typing - Automatic Gender Recognition from Interactive Textual Chats Using Typing Behaviour -- An Efficient Framework to Build up Heart Sounds and Murmurs Datasets Used for Automatic Cardiovascular Diseases Classifications -- Facial Recognition and Emotional Expressions Over Video Conferencing Based on Web Real Time Communication and Artificial Intelligence -- Recent Advances in Intelligent Imaging Systems for Early Prediction of Colorectal Cancer: A Perspective -- A Survey on Phishing Attacks Detected by Different Machine Learning Techniques -- Artificial Intelligence in 3D Printing -- Finding Suitable Threshold for Support in Apriori Algorithm Using Statistical Measures -- Optimum Voltage Sag Compensation Strategies Using DVR Series with the Critical Loads -- Wind Distributed Generation with the Power Distribution Network for Power Quality Control -- Multi-objective Quantum Moth Flame Optimization for Clustering -- Rough Sets Crow Search Algorithm for Inverse Kinematics.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  3. 83

    Preventing Credit Card Fraud : a Complete Guide for Everyone from Merchants to Consumers. by Lee, Jen Grondahl

    Blue Ridge Summit : Rowman & Littlefield Publishers, 2017
    Table of Contents: “…About the Authors; Foreword; Introduction; Part I: Protecting Yourself as a Consumer or Client; 1 Protecting Yourself from Credit Card Fraud as a Consumer; 2 Don't Get Skimmed-and Using the New Chip Cards; 3 Ways to Guard Your Personal Financial Information; 4 Credit Card Offers; 5 Avoiding Free Trial and Special Discount Scams; 6 Credit Card and Service Scams; 7 Protecting Your Credit Card; 8 Phishing and Other Online Frauds; 9 What to Do If You Are a Victim of Credit Card Fraud or Personal Identity Theft; Part II: Protecting Yourself as a Merchant or Service Provider.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  4. 84

    Proceedings of Integrated Intelligence Enable Networks and Computing IIENC 2020

    Singapore : Springer Singapore : Imprint: Springer, 2021
    1st ed. 2021.
    Table of Contents: “…Segmentation of Retinal Blood Vessel using an Algorithm-based Gamma Distribution of Matched filter -- Chapter 10. Phishing Prevention Techniques: Past, Present and Future.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  5. 85

    The Cryptocurrency and Digital Asset Fraud Casebook, Volume II DeFi, NFTs, DAOs, Meme Coins, and Other Digital Asset Hacks by Scharfman, Jason

    Cham : Springer Nature Switzerland : Imprint: Palgrave Macmillan, 2024
    1st ed. 2024.
    Table of Contents: “…CHAPTER 1 Introduction to Cryptocurrency and Digital Asset Fraud and Crime -- CHAPTER 2 Crypto Romance Scams, Pig Butchering and Crypto Recovery Scams -- CHAPTER 3 Decentralized Autonomous Organization (DAO) Fraud, Hacks and Controversies -- CHAPTER 4 Decentralized Finance (DeFi) fraud and hacks: Part 1 -- CHAPTER 5 Decentralized Finance (DeFi) fraud and hacks: Part 2 -- CHAPTER 6 Decentralized Finance (DeFi) fraud and hacks: Part 3 -- CHAPTER 7 Crypto Phishing and Spoofing Scams -- CHAPTER 8 Meme Coins, Honeypots, and Artificial Intelligence Enabled Crypto Fraud -- CHAPTER 9 Decentralized Applications (dApp) and Cryptocurrency Gaming Fraud -- CHAPTER 10 Wallet Drainers, Crypto Stealers and Cryptojacking -- CHAPTER 11 Non-Fungible Token (NFT) Frauds, Hacks and Controversies -- CHAPTER 12 Additional Cases and Trends in Cryptocurrency Fraud.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  6. 86
  7. 87

    Advances in Security, Networks, and Internet of Things Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20

    Cham : Springer International Publishing : Imprint: Springer, 2021
    1st ed. 2021.
    Table of Contents: “…Statistical Analysis of Prime Number Generators Putting Encryption at Risk -- Secure Authentication Protocol for Drones in LTE Networks -- Memorable Password Generation with AES in ECB Mod -- A Comprehensive Survey on Fingerprint Liveness Detection Algorithms by Database and Scanner Model -- Suitability of Voice Recognition within the IoT Environment -- Chor-Rivest Knapsack Cryptosystem in a Post-Quantum World -- An Effective Tool for Assessing the Composite Vulnerability of Multi-Factor Authentication Technologies -- Phishing Prevention Using Defense in Depth -- Phishing Detection using Deep Learning -- Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach -- Vulnerability of Virtual Private Networks to Web Fingerprinting Attack -- Intrusion Detection through Gradient in Digraphs -- A Practice of Detecting Insider Threats within a Network -- Towards Home Area Network Hygiene: Device Classification and Intrusion Detection for Encrypted Communications -- The Impact of 21st Century Skills and Computing Cognition Cyber Skills on Graduates' Work Readiness in Cyber Security -- Enhancing the Cybersecurity Education Curricula Through Quantum Computation -- CyberCheck.me: A Review of a Small to Medium Enterprise Cyber Security Awareness Program -- A Hybrid AI and Simulation-Based Optimization DSS for Post-Disaster Logistics -- A Posteriori Access Control with an Administrative Policy -- An Analysis of Applying STIR/Shaken to Prevent Robocalls -- Supervised Learning for Detecting Stealthy False Data Injection Attacks in the Smart Grid -- Vulnerability Analysis of 2500 Docker Hub Images -- Analysis of Conpot and its BACnet Features for Cyber-Deception -- Automotive Vehicle Security Metrics -- Requirements for IoT Forensic Models - A Review -- Mobile Malware Forensics Review: Issues and Challenges -- The Organizational Cybersecurity Success Factors: An Exhaustive Literature Review -- A Hybrid Recommender System for Cybersecurity Based on a Rating Approach -- Secure-Stor: A Novel Hybrid Secure Edge Server Architecture and CDN to Enhance the Security and Response Time for Edge Devices -- Leveraging Security Management with Low-Level System Monitoring and Visualization -- Lightweight Network Steganography for Distributed Electronic Warfare System Communications -- Security of DBMSs -- Static Analysis for Software Reliability and Security.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  8. 88

    Information and Communications Technologies Second International Libyan Conference, ILCICT 2023, Tripoli, Libya, September 4–6, 2023, Proceedings

    Cham : Springer Nature Switzerland : Imprint: Springer, 2024
    1st ed. 2024.
    Table of Contents: “…. -- Performance Analysis of Classifying URL Phishing Using Recursive Feature Elimination. -- Performance Evaluation Of Satellite Communication Link at Millimeter Wave based on Rain Fade Data Measured In Libya. -- BJT Based Voltage Reference Circuits Comparisons in 65nm CMOS Process. -- Computer and Information Systems. -- Solar flare classification via modified metaheuristic optimized extreme gradient boosting. -- Naïve Bayes Classifier with Genetic Algorithm for Phishing Website Detection. -- Object-Relational Database Design Approaches: A Survey of Approaches and Techniques. -- Event Abstration in a Forensic Timeline. -- Innovative SQL Query Generator using an Arabic Language description. -- Handling Imbalanced Dataset in Software Refactoring Prediction. -- KnowAir: A Low-Cost PM2.5 sensor Citizen-Based Air Pollution Monitoring System for Real-Time. -- Implementation of Qur’anic Question Answering System Based on the BERT Model. -- IT Security Office: The Way Forward for IT Goverenece for Libyan Organizations. -- Sentiment Analysis of Libyan Middle Region Using Machine Learning with TF-IDF and N-grams. -- Data Quality Considerations for ERP Implementation: Techniques for Effective Data Management. -- Fractional Calculus Application for PID Controller of a Nuclear Power Plant. -- Image Processing, Computer Vision and Internet of Things. -- Palm-print Recognition based on a Fusion of Feature Selection Techniques. -- Predictive Analytics Based on AutoML Email Spam Detection. -- Enhancing a System for Predicting Diabetes Utilizing Conventional Machine Learning Approaches. -- Enhanced Facial Expression Recognition Using Pre-trained Models and Image Processing Techniques. -- Identifying Bird Calls in Soundscapes Using Convolutional Neural Networks. -- Automated ECG Classification for Myocardial Infarction Diagnosis using CNN and Wavelet Transform. -- Detecting Chest Diseases with Chest X-Ray Using Convolutional Neural Network. -- Real Time Arabic Sign Language Recognition Using Machine Learning: A Vision - Based Approach.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  9. 89

    Software Engineering and Management: Theory and Application Volume 16

    Cham : Springer Nature Switzerland : Imprint: Springer, 2024
    1st ed. 2024.
    Table of Contents: “…Measuring the Effects of Signal-To-Noise in EEG Emotion Recognition -- 9. Phishy? Detecting Phishing Emails Using Machine Learning and Natural Language Processing -- 10. …”
    Format: Electronic eBook
    Full text (Wentworth users only)
  10. 90

    Machine learning applications : from computer vision to robotics

    Hoboken, New Jersey : Wiley-IEEE Press, 2024
    Table of Contents: “…Statistical similarity in machine learning -- Development of machine learning-based methodologies for adaptive intelligent e-learning systems and time series analysis techniques -- Time-series forecasting for stock market using convolutional neural networks -- Comparative study for applicability of color histograms for CBIR used for crop leaf disease detection -- Stock Index Forecasting Using RNN-Long Short Term Memory -- Study and analysis of machine learning models for detection of phishing URLs -- Real-world applications of blockchain technology in internet of things -- Advanced persistent threat: Korean cyber security knack model impost and applicability -- Integration of Blockchain Technology and Internet of Things: Challenges and its Solutions -- Machine learning techniques for swot analysis of online education system -- Crop yield and soil moisture prediction using machine learning algorithms. -- Multi-rate signal processing in WSN for channel capacity and energy efficiency using machine learning. -- Introduction to mechanical design of AI-based robotic system.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  11. 91

    Virtual culture : identity and communication in cybersociety

    London ; Thousand Oaks : Sage Publications, 1997
    Table of Contents: “…Jones -- The individual within the collective : virtual ideology and the realization of collective principles / Jan Fernback -- Virtual commonality : looking for India on the Internet / Ananda Mitra -- Structural relations, electronic media, and social change : the public electronic network and the homeless / Joseph Schmitz -- Why we argue about virtual community : a case study of the phish.net fan community / Nessim Watson -- Gay men and computer communication : a discourse of sex and identity in cyberspace / David F. …”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  12. 92

    Adaptive Autonomous Secure Cyber Systems

    Cham : Springer International Publishing : Imprint: Springer, 2020
    1st ed. 2020.
    Table of Contents: “…Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. …”
    Format: Electronic eBook
    Full text (Wentworth users only)
  13. 93

    Security and Privacy in Dynamic Environments Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22–24 May 2006, Karlstad, Sweden by Fischer-Hübner, Simone

    Boston, MA : Springer US, 2006
    Table of Contents: “…Improving Availability of Emergency Health Information without Sacrificing Patient Privacy -- Ensuring Privacy for Buyer-Seller E-Commerce -- Authenticated Query Flooding in Sensor Networks -- A Framework for Web Services Trust -- Security-by-Ontology: A Knowledge-Centric Approach -- Analysis and Improvement of Anti-Phishing Schemes -- Protecting Web Services from DOS Attacks by SOAP Message Validation -- A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps -- Sealed-Bid Micro Auctions.…”
    Format: Electronic eBook
    Full text (Wentworth users only).
  14. 94

    Proceedings of Data Analytics and Management ICDAM 2023, Volume 4

    Singapore : Springer Nature Singapore : Imprint: Springer, 2023
    1st ed. 2023.
    Table of Contents: “…Chapter 1: Deep Spectral Feature Representations via Attention Based Neural Network Architectures for Accented Malayalam Speech - A Low-Resourced language -- Chapter 2: Improving Tree Based Convolutional Neural Network Model for Image Classification -- Chapter 3: Smartphone Malware Detection based on Enhanced Correlation-based Feature Selection on Permissions -- Chapter 4: Fake News Detection Using Ensemble Learning Models -- Chapter 5: Ensemble Approach for Suggestion Mining Using Deep Recurrent Convolutional Networks -- Chapter 6: A CNN Based Self-Attentive approach to Knowledge Tracing -- Chapter 7: LIPFCM: Linear Interpolation-Based Possibilistic Fuzzy C-Means Clustering Imputation method for handling Incomplete data -- Chapter 8: Experimental Analysis of Two Wheeler Headlight Illuminance Data from the Perspective of Traffic Safety -- Chapter 9: Detecto: The Phishing Website Detection -- Chapter 10: Synergizing Voice Cloning and ChatGPT for Multimodal Conversational Interfaces. etc.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  15. 95

    Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques by Chauhan, Sudhanshu, Panda, Nutan Kumar

    Waltham, MA : Syngress, an imprint of Elsevier, 2015
    Table of Contents: “…; DARKNET SERVICES; DISCLAIMER; Chapter 10 -- Data Management and Visualization; INTRODUCTION; DATA MANAGEMENT AND ANALYSIS TOOLS; Chapter 11 -- Online Security; INTRODUCTION; MALWARES; PHISHING.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Access E-Book
    Access E-Book.
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  16. 96

    ISC2 CISSP Certified Information Systems Security Professional Official Study Guide by Chapple, Mike, 1975-, Stewart, James Michael, Gibson, Darril

    Hoboken, New Jersey : John Wiley & Sons, Inc., 2024
    10th ed.
    Table of Contents: “…Social Engineering Principles -- Eliciting Information -- Prepending -- Phishing -- Spear Phishing -- Whaling -- Spam -- Shoulder Surfing -- Invoice Scams -- Hoax -- Impersonation and Masquerading -- Tailgating and Piggybacking -- Dumpster Diving -- Identity Fraud -- Typosquatting -- Influence Campaigns -- Establish and Maintain a Security Awareness, Education, and Training Program -- Awareness -- Training -- Education -- Improvements -- Effectiveness Evaluation -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 3 Business Continuity Planning…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  17. 97

    Advanced Network Technologies and Intelligent Computing Third International Conference, ANTIC 2023, Varanasi, India, December 20-22, 2023, Proceedings, Part I

    Cham : Springer Nature Switzerland : Imprint: Springer, 2024
    1st ed. 2024.
    Table of Contents: “…. -- Intrusion Watchdog: Enhancing Intrusion Detection System with Machine Learning using 3-way Feature Selection Technique. -- Phishing URLs Detection Method using Hybrid Feature and Convolutional Neural Networks with Attention Mechanisms. -- Exploring Multi-Attribute Selection Strategies for Effective Phishing Detection with Machine Learning. -- Zero-day exploits framework of supply chain networks. -- SMASK: Parallel Probabilistic Privacy-Preserving Frequent Pattern Mining Technique for Big Data. -- SMAKMS_FC: Secure Mutual Authentication and Key Management Scheme for Fog Computing. -- Comparative Analysis on Network Attack Prediction Used Deep Learning Approaches on Software Security Testing. -- DNA-Based Elliptic Curve Cryptography for Data Security in IoT.…”
    Format: Electronic eBook
    Get full text
    Get full text
    Get full text
    Get full text
  18. 98

    Rock Brands : Selling Sound in a Media Saturated Culture. by Christian, Elizabeth Barfoot, 1971-

    Lanham : Rowman & Littlefield Pub. Group, 2010
    Table of Contents: “…Birds of a Feather? Positioning Phish in Relation to the Grateful Dead in Rolling Stone Album Reviews.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  19. 99

    Adversary-Aware Learning Techniques and Trends in Cybersecurity

    Cham : Springer International Publishing : Imprint: Springer, 2021
    1st ed. 2021.
    Table of Contents: “…Adversarial Machine Learning in Text: A Case Study of Phishing Email Detection with RCNN model -- 5. Overview of GANs for Image Synthesis and Detection Methods -- 6. …”
    Format: Electronic eBook
    Full text (Wentworth users only)
  20. 100

    Recent Trends in Communication and Intelligent Systems Proceedings of ICRTCIS 2019

    Singapore : Springer Singapore : Imprint: Springer, 2020
    1st ed. 2020.
    Table of Contents: “…Fast Convergent Gravitational Search Algorithm -- An Experimental Perusal of Impedance Plethysmography for Biomedical Application -- Compressive Sensing: An Efficient Approach for Image Compression & Recovery -- Optimal Location of Renewable Energy Generator in Deregulated Power Sector -- A Genetic Improved Quantum Cryptography Model to Optimize Network Communication -- Neural Networks - Based Framework for Detecting Chemically Ripened Banana Fruits -- Low Power CMOS Low Transconductance OTA for Electrocardiogram Applications -- Spiral Resonator Microstrip Patch Antenna with Metamaterial on Patch and Ground -- A P-OLSR AND E-OLSR Routing Protocols For Urban Vehicular Ad Hoc Networks (VANETs) -- Evaluation of Similarity Measure to find Coherence -- Bagged Random Forest approach to classify Sentiments based on Technical Words -- Healthcare Services Customers’ ICT-Related Expectations and Experiences -- Analysis of SNR Improvement Using Compressive Sensing for Musical Instruments after Signal Compression -- A Framework to Impede Phishing Activities Using Neural Net and Website Features -- Overcoming the Security Shortcomings between Open vSwitch and Network Controller.…”
    Format: Electronic eBook
    Full text (Wentworth users only)