Searched for: subject%3A%22phishing%22
(1 - 3 of 3)
document
Moreira Moura, G.C. (author), Sadre, R. (author), Pras, A. (author)
Analogous to the real world, sources of malicious activities on the Internet tend to be concentrated in certain networks instead of being evenly distributed. In this article, we formally define and frame such areas as Internet Bad Neighborhoods. By extending the reputation of malicious IP addresses to their neighbors, the bad neighborhood...
journal article 2014
document
Apruzzese, Giovanni (author), Conti, M. (author), Yuan, Ying (author)
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks that break every ML model, or defenses that withstand most attacks. Unfortunately, little consideration is given to the actual cost of the attack or the defense. Moreover, adversarial samples are often crafted in the "feature-space", making the...
conference paper 2022
document
Bustio-Martínez, Lázaro (author), Herrera-Semenets, Vitali (author), García-Mendoza, Juan-Luis (author), González-Ordiano, Jorge Ángel (author), Zúñiga-Morales, Luis (author), Sánchez Rivero, Rubén (author), Quiróz-Ibarra, José Emilio (author), Santander-Molina, Pedro Antonio (author), van den Berg, Jan (author), Buscaldi, Davide (author)
Persuasion is a human activity of influence. In marketing, persuasion can help customers find solutions to their problems, make informed choices, or convince someone to buy a useful (or useless) product or service. In computer crimes, persuasion can trick users into revealing sensitive information, or even performing actions that benefit...
conference paper 2024