Baror et al., 2019 - Google Patents
A taxonomy for cybercrime attack in the public cloudBaror et al., 2019
View PDF- Document ID
- 17164678609523282939
- Author
- Baror S
- Venter H
- Publication year
- Publication venue
- International conference on cyber warfare and security
External Links
Snippet
Public cloud users interact online or offline using natural language. While the language used could be in Xhosa, English, Afrikaans, Zulu or Ndebele, the core component is communication. Therefore, natural language is the language that people speak, listen to and …
- 238000000034 method 0 abstract description 30
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
- G06F17/30657—Query processing
- G06F17/3066—Query translation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30731—Creation of semantic tools
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gupta et al. | A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment | |
Korkmaz et al. | Detection of phishing websites by using machine learning-based URL analysis | |
Patil et al. | Survey on malicious web pages detection techniques | |
US9191411B2 (en) | Protecting against suspect social entities | |
Jain et al. | Comparative analysis of features based machine learning approaches for phishing detection | |
Verma et al. | Email phishing: Text classification using natural language processing | |
Baror et al. | A taxonomy for cybercrime attack in the public cloud | |
CN112567707A (en) | Enhanced techniques for generating and deploying dynamic false user accounts | |
Wazid et al. | A framework for detection and prevention of novel keylogger spyware attacks | |
Alharbi et al. | Security in social-media: awareness of phishing attacks techniques and countermeasures | |
Sahingoz et al. | Phishing detection from urls by using neural networks | |
Mosa et al. | Machine learning techniques for detecting phishing URL attacks | |
Afaq et al. | A critical analysis of cyber threats and their global impact | |
Jaber et al. | COVID-19 and global increases in cybersecurity attacks: review of possible adverse artificial intelligence attacks | |
Yassein et al. | Survey of online social networks threats and solutions | |
P. Velayudhan et al. | Compromised account detection in online social networks: A survey | |
Alnawafleh et al. | Review of the mechanisms used to protect the big data from attacks | |
Soumya et al. | Survey on threats in online social media | |
Tabassum et al. | A review on malicious URLs detection using machine learning methods | |
Chung et al. | A review on social media phishing: factors and countermeasures | |
Alotaibi et al. | Threats, crimes and issues of privacy of users’ information shared on online social networks | |
Maurushat et al. | Artificial intelligence enabled cyber fraud: a detailed look into payment diversion fraud and ransomware | |
Demenongo et al. | Ensemble Model for the Detection of Phishing URLs | |
Bari et al. | Securing digital economies: Detection of phishing attacks using machine learning approaches | |
Debnath et al. | A comprehensive assessment on phishing, smishing and vishing |