首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 9 毫秒
1.
2.
结合近年来日益猖獗的"网络钓鱼"事件,解释了"网络钓鱼"的概念,详述了"网络钓鱼"者的惯用手段,并提出具体的防范措施.  相似文献   

3.
4.
5.
6.
7.
8.
The idea of Cybercrime is not new, yet there is significant confusion amongst academics, computer security experts and users as to the extent of real Cybercrime. In this paper, we explore the breadth of computer-based crime, providing a definition of the emerging terms “Cybercrime” and “crimeware”. We then divide Cybercrime into two distinct categories: Type I Cybercrime, which is mostly technological in nature, and Type II Cybercrime, which has a more pronounced human element. We then use two case studies to illustrate the role of crimeware in different types of Cybercrime, and offer some observations on the role of cognition in the process of Cybercrime. Finally we provide several suggestions for future work in the area of Cybercrime.  相似文献   

9.
10.
Fast flux aims to keep phishing and scam campaigns afloat by provisioning a fraudulent Web site's domain name system records to make the site resolve to numerous, short-lived IP addresses. Although fast flux hurts takedown efforts, it's possible to detect and defend against it.  相似文献   

11.
What can we reasonably expect from law enforcement in terms of policing high tech crime? What can the police reasonably expect from us in terms of adequacy of prevention and co-operation when a suspected crime occurs? Cyber Crime Policing can only be understood within the broader issues facing the criminal justice system. It seems to me that both sides may be expecting too much of each other and a more realistic approach might be more productive. In this presentation I will concentrate on the situation here in the UK; however similar patterns occur in many other countries.  相似文献   

12.
13.
14.
15.
Phishing is an online identity theft that aims to steal sensitive information such as username, password and online banking details from its victims. Phishing education needs to be considered as a means to combat this threat. This paper reports on a design and development of a mobile game prototype as an educational tool helping computer users to protect themselves against phishing attacks. The elements of a game design framework for avoiding phishing attacks were used to address the game design issues. Our mobile game design aimed to enhance the users' avoidance behaviour through motivation to protect themselves against phishing threats. A think-aloud study was conducted, along with a pre- and post-test, to assess the game design framework though the developed mobile game prototype. The study results showed a significant improvement of participants' phishing avoidance behaviour in their post-test assessment. Furthermore, the study findings suggest that participants' threat perception, safeguard effectiveness, self-efficacy, perceived severity and perceived susceptibility elements positively impact threat avoidance behaviour, whereas safeguard cost had a negative impact on it.  相似文献   

16.
17.
18.
19.
In this paper we introduce our experiences in applying the Web 2.0 philosophy to build a TV guide system for Interactive Digital TV (IDTV) platforms. Subscribers give their opinion about TV content and, informally, a folksonomy is progressively built. Based on this shared knowledge, the TV guide obtains personal recommendations and allows users to browse among the multimedia content. Additionally, and over this collaborative layer, a more formal vision enables applying semantic reasoning to supplement the knowledge informally inferred.  相似文献   

20.
Middlehurst  Matthew  Large  James  Flynn  Michael  Lines  Jason  Bostrom  Aaron  Bagnall  Anthony 《Machine Learning》2021,110(11-12):3211-3243
Machine Learning - The Hierarchical Vote Collective of Transformation-based Ensembles (HIVE-COTE) is a heterogeneous meta ensemble for time series classification. HIVE-COTE forms its ensemble from...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号