[go: up one dir, main page]

Baror et al., 2019 - Google Patents

A taxonomy for cybercrime attack in the public cloud

Baror et al., 2019

View PDF
Document ID
17164678609523282939
Author
Baror S
Venter H
Publication year
Publication venue
International conference on cyber warfare and security

External Links

Snippet

Public cloud users interact online or offline using natural language. While the language used could be in Xhosa, English, Afrikaans, Zulu or Ndebele, the core component is communication. Therefore, natural language is the language that people speak, listen to and …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • G06F17/30657Query processing
    • G06F17/3066Query translation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30731Creation of semantic tools
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Similar Documents

Publication Publication Date Title
Gupta et al. A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment
Korkmaz et al. Detection of phishing websites by using machine learning-based URL analysis
Patil et al. Survey on malicious web pages detection techniques
US9191411B2 (en) Protecting against suspect social entities
Jain et al. Comparative analysis of features based machine learning approaches for phishing detection
Verma et al. Email phishing: Text classification using natural language processing
Baror et al. A taxonomy for cybercrime attack in the public cloud
CN112567707A (en) Enhanced techniques for generating and deploying dynamic false user accounts
Wazid et al. A framework for detection and prevention of novel keylogger spyware attacks
Alharbi et al. Security in social-media: awareness of phishing attacks techniques and countermeasures
Sahingoz et al. Phishing detection from urls by using neural networks
Mosa et al. Machine learning techniques for detecting phishing URL attacks
Afaq et al. A critical analysis of cyber threats and their global impact
Jaber et al. COVID-19 and global increases in cybersecurity attacks: review of possible adverse artificial intelligence attacks
Yassein et al. Survey of online social networks threats and solutions
P. Velayudhan et al. Compromised account detection in online social networks: A survey
Alnawafleh et al. Review of the mechanisms used to protect the big data from attacks
Soumya et al. Survey on threats in online social media
Tabassum et al. A review on malicious URLs detection using machine learning methods
Chung et al. A review on social media phishing: factors and countermeasures
Alotaibi et al. Threats, crimes and issues of privacy of users’ information shared on online social networks
Maurushat et al. Artificial intelligence enabled cyber fraud: a detailed look into payment diversion fraud and ransomware
Demenongo et al. Ensemble Model for the Detection of Phishing URLs
Bari et al. Securing digital economies: Detection of phishing attacks using machine learning approaches
Debnath et al. A comprehensive assessment on phishing, smishing and vishing