Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Among various cyber threats, a DDoS attack is one of the major Internet threats that can affect anyone and even cause tremendous financial damage to organization that uses cloud-based services, while the mitigation of this threat can be... more
    • by 
    •   48  
      Information SystemsComputer Security And ReliabilityInformation ScienceInformation Technology
Today very important means of communication is the e-mail that allows people all over the world to communicate, share data, and perform business. Yet there is nothing worse than an inbox full of spam; i.e., information crafted to be... more
    • by 
    •   12  
      Estimation and Filtering TheoryE Mail InteractionsAdaptive FilteringKalman Filter
These scumbags got my email address and now send me tons of emails about things that all lead to them asking for money from me to find out why they are emailing me.
    • by 
    •   5  
      SPAM419 ScamsInternet scamsSpam Filtering
–The Spam Emails are regularly causing huge losses to business on a regular basis. The Spam filtering is an automated technique to identity SPAM and HAM (Non-Spam). The Web Spam filters can be categorized as: Content based spam filters... more
    • by 
    •   22  
      SPAMBotnet attacksBotnetsAnti spam
    • by 
    •   5  
      Botnet Detection AlgorithmsDetection of Botnets Using Combined Host- and Network-Level InformationUsing uncleanliness to predict future botnet addressesUsing Spamming Botnets: Signatures and Characteristics
The Internet or World Wide Web has become prominent platform for business and commerce and is witnessing user growth with increased penetration of mobile Internet. Huge traffic is being generated, some of it being legitimate and the rest... more
    • by 
    •   14  
      Computer MalwareMalwareDeceptionMalware Detection
Over the past decade, the digitization of services transformed the healthcare sector leading to a sharp rise in cybersecurity threats. Poor cybersecurity in the healthcare sector, coupled with high value of patient records attracted the... more
    • by 
    •   18  
      Intrusion Detection SystemsMalware AnalysisBotnet attacksMalware