Quantifying Psychological Sophistication of Malicious Emails (English)
- New search for: Montañez Rodriguez, Rosana
- New search for: Longtchi, Theodore
- New search for: Gwartney, Kora
- New search for: Ear, Ekzhin
- New search for: Azari, David P.
- New search for: Kelley, Christopher P.
- New search for: Xu, Shouhuai
- New search for: Yung, Moti
- Further information on Yung, Moti:
-
https://orcid.org/https://orcid.org/0000-0003-0848-0873
- New search for: Chen, Chao
- Further information on Chen, Chao:
-
https://orcid.org/https://orcid.org/0000-0003-1355-3870
- New search for: Meng, Weizhi
- Further information on Meng, Weizhi:
-
https://orcid.org/https://orcid.org/0000-0003-4384-5786
- New search for: Montañez Rodriguez, Rosana
- New search for: Longtchi, Theodore
- New search for: Gwartney, Kora
- New search for: Ear, Ekzhin
- New search for: Azari, David P.
- New search for: Kelley, Christopher P.
- New search for: Xu, Shouhuai
In:
Science of Cyber Security
: 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings
;
Chapter: 19
;
319-331
;
2023
- Article/Chapter (Book) / Electronic Resource
-
Title:Quantifying Psychological Sophistication of Malicious Emails
-
Additional title:Lect.Notes Computer
-
Contributors:Yung, Moti ( editor ) / Chen, Chao ( editor ) / Meng, Weizhi ( editor ) / Montañez Rodriguez, Rosana ( author ) / Longtchi, Theodore ( author ) / Gwartney, Kora ( author ) / Ear, Ekzhin ( author ) / Azari, David P. ( author ) / Kelley, Christopher P. ( author ) / Xu, Shouhuai ( author )
-
Conference:International Conference on Science of Cyber Security ; 2023 ; Melbourne, VIC, Australia
-
Published in:Science of Cyber Security : 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings ; Chapter: 19 ; 319-331Lecture Notes in Computer Science ; 14299 ; 319-331
-
Publisher:
- New search for: Springer Nature Switzerland
-
Place of publication:Cham
-
Publication date:2023-11-21
-
Size:13 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
ACDroid: Detecting Collusion Applications on Smart DevicesXi, Ning / He, Yihuan / Zhang, Yuchen / Wang, Zhi / Feng, Pengbin et al. | 2023
- 2
-
DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual MachinesRuan, Wenwen / Wang, Wenhao / Liu, Shuang / Duan, Ran / Yan, Shoumeng et al. | 2023
- 3
-
Keeping Your Enemies Closer: Shedding Light on the Attacker’s Optimal StrategyCai, Weixia / Chen, Huashan / Liu, Feng et al. | 2023
- 4
-
Cyber Attacks Against Enterprise Networks: Characterization, Modeling and ForecastingSun, Zheyuan / Xu, Maochao / Schweitzer, Kristin M. / Bateman, Raymond M. / Kott, Alexander / Xu, Shouhuai et al. | 2023
- 5
-
MCVDSSE: Secure Multi-client Verifiable Dynamic Symmetric Searchable EncryptionLi, Jinyang / Cao, Zhenfu / Shen, Jiachen / Dong, Xiaolei et al. | 2023
- 6
-
A Graphical Password Scheme Based on Rounded Image SelectionQin, Xinyuan / Li, Wenjuan et al. | 2023
- 7
-
Implementation of the Elliptic Curve MethodLi, Xiuxiu / Yu, Wei / Wang, Kunpeng et al. | 2023
- 8
-
Almost Injective and Invertible Encodings for Jacobi Quartic CurvesLi, Xiuxiu / Yu, Wei / Wang, Kunpeng / Li, Luying et al. | 2023
- 9
-
SeeStar: An Efficient Starlink Asset Detection FrameworkZhang, Linkang / Qin, Yunyang / Zhu, Yujia / Cheng, Yifei / Jie, Zhen / Liu, Qingyun et al. | 2023
- 10
-
Privacy-Enhanced Anonymous and Deniable Post-quantum X3DHChen, Kaiming / Miyaji, Atsuko / Wang, Yuntao et al. | 2023
- 11
-
Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial NetworksMa, Bin / Li, Kun / Xu, Jian / Wang, Chunpeng / Li, Jian / Zhang, Liwei et al. | 2023
- 12
-
An Empirical Study of AI Model’s Performance for Electricity Load Forecasting with Extreme Weather ConditionsGuo, Fusen / Wu, Jian-Zhang / Pan, Lei et al. | 2023
- 13
-
AST2Vec: A Robust Neural Code Representation for Malicious PowerShell DetectionMiao, Han / Bao, Huaifeng / Tang, Zixian / Li, Wenhao / Wang, Wen / Chen, Huashan / Liu, Feng / Sun, Yanhui et al. | 2023
- 14
-
Real-Time Aggregation for Massive Alerts Based on Dynamic Attack Granularity GraphWang, Haiping / Li, Binbin / Zang, Tianning / Yang, Yifei / Qi, Zisen / Jia, Siyu / Ding, Yu et al. | 2023
- 15
-
Decompilation Based Deep Binary-Source Function MatchingWang, Xiaowei / Yuan, Zimu / Xiao, Yang / Wang, Liyan / Yao, Yican / Chen, Haiming / Huo, Wei et al. | 2023
- 16
-
Event-Based Threat Intelligence Ontology ModelWang, Peng / Dai, Guangxiang / Zhai, Lidong et al. | 2023
- 17
-
Optimally Blending Honeypots into Production Networks: Hardness and AlgorithmsZaman, Md Mahabub Uz / Tao, Liangde / Maldonado, Mark / Liu, Chang / Sunny, Ahmed / Xu, Shouhuai / Chen, Lin et al. | 2023
- 18
-
WebMea: A Google Chrome Extension for Web Security and Privacy Measurement StudiesRen, Mengxia / Josey, Joshua / Yue, Chuan et al. | 2023
- 19
-
Quantifying Psychological Sophistication of Malicious EmailsMontañez Rodriguez, Rosana / Longtchi, Theodore / Gwartney, Kora / Ear, Ekzhin / Azari, David P. / Kelley, Christopher P. / Xu, Shouhuai et al. | 2023
- 20
-
SVFL: Secure Vertical Federated Learning on Linear ModelsLuo, Kaifeng / Cao, Zhenfu / Shen, Jiachen / Dong, Xiaolei et al. | 2023
- 21
-
Multiprime Strategies for Serial Evaluation of eSIDH-Like IsogeniesLeGrow, Jason T. / Koziel, Brian / Azarderakhsh, Reza et al. | 2023
- 22
-
Adaptively Secure Constrained Verifiable Random FunctionZan, Yao / Li, Hongda / Xu, Haixia et al. | 2023
- 23
-
A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier MomentsMa, Bin / Tao, Zhongquan / Xu, Jian / Wang, Chunpeng / Li, Jian / Zhang, Liwei et al. | 2023
- 24
-
VaultBox: Enhancing the Security and Effectiveness of Security AnalyticsTrivedi, Devharsh / Triandopoulos, Nikos et al. | 2023
- 25
-
Two-Stage Anomaly Detection in LEO Satellite NetworkWang, Yipeng / Chen, Peixian / Ai, Shan / Liang, Weipeng / Liao, Binjie / Mo, Weichuan / Wang, Heng et al. | 2023
- 26
-
Hydra: An Efficient Asynchronous DAG-Based BFT ProtocolAn, Zhuo / Wang, Mingsheng / Liu, Dongdong / Li, Taotao / Lai, Qiang et al. | 2023
- 27
-
Redactable Blockchain in the Permissioned SettingPeng, Chunying / Xu, Haixia / Liao, Huimei / Tang, Jinling / Tang, Tao et al. | 2023
- 28
-
A Multi-level Sorting Prediction Enhancement-Based Two-Dimensional Reversible Data Hiding Algorithm for JPEG ImagesMa, Bin / Wang, Songkun / Xu, Jian / Wang, Chunpeng / Li, Jian / Li, Xiaolong et al. | 2023
- 29
-
Research on Encrypted Malicious 5G Access Network Traffic Identification Based on Deep LearningGao, Zongning / Zhang, Shunliang et al. | 2023
- 30
-
A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional NetworkHe, Pengju / Zhang, Haibo / Feng, Yaokai / Sakurai, Kouichi et al. | 2023