The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an intelligent model for detection of phishing emails which depends on a preprocessing phase that extracts a set of features concerning different email parts. The extracted features are classified using the J48 classification algorithm. We experimented with a total of 23 features that have been used in the literature. Ten-fold cross-validation was applied for training, testing...
More and more netizens prefer to comment on social hot issues today and their views become very useful for government decision-making. Specially, news and related comments often influence decision behavior of officers. However, it becomes a key problem to analyze them automatically in order to provide references for decision-making. One of effective way is to cluster news comments. In this paper,...
Since attack graphs provide practical attack context and relationships among vulnerabilities, researchers have been trying to evaluate network security based on attack graphs. However, previous works focus their attention on specific evaluations they concerned, and each does things in his own way. There is no explicit way telling network administrators how to measure network security in a general...
End user satisfaction of software or information system is an important research topic. However, existing research has been focused on questionnaire and indicators selection. An important issue has not been paid enough attention so far is that the traditional method is hardly suitable in Web 2.0, which user using pattern and software runtime environment have changed. In this paper, we present a new...
Attack graphs are important tools for analyzing network security vulnerabilities. Recently, the generation method of attack graphs is a hot topic to the security researchers. As previous works encounter the scalability problem and inaccurate input information problem, we propose a novel method to automatic construction of attack graphs based on probability. After introducing prior-probability, match-probability,and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.