4 research outputs found

    Enrich awareness of users to detect phishing websites

    Get PDF
    Phishing attack is used for identity theft with the help of social engineering and some sophisticated attacks. To attract the user by clicking a URL and is trapped to a phishing Web page. Security for user’s credentials is one of most important factor for organizations nowadays. It can be achieved through several ways like education and training. Through training and education the level of awareness will be increased also it helps to mitigate phishing. Approach with several steps is introduced in this paper, where a user must take a look or take these precautionary measures if the user is browsing any Web browser. We found it possible to detect Phishing Web pages without anti Phishing solutions. This approach contains several steps to examine whether the Web page is a real Web page or a fake Webpage. All these steps will check the phishing features exist in that Web page or not. For evaluation of our approach we analyzed the data set of Phish Tank, this data set is full of Phishing Web Pages. The purpose of evaluation is to check the features discussed in our approach to aware the user. From the following result it is resulted that the user can detect without using any Anti Phishing solution just by taking some steps to check the Web page for certain features

    Cyberstalking Victimization Model Using Criminological Theory: A Systematic Literature Review, Taxonomies, Applications, Tools, and Validations

    Full text link
    Cyberstalking is a growing anti-social problem being transformed on a large scale and in various forms. Cyberstalking detection has become increasingly popular in recent years and has technically been investigated by many researchers. However, cyberstalking victimization, an essential part of cyberstalking, has empirically received less attention from the paper community. This paper attempts to address this gap and develop a model to understand and estimate the prevalence of cyberstalking victimization. The model of this paper is produced using routine activities and lifestyle exposure theories and includes eight hypotheses. The data of this paper is collected from the 757 respondents in Jordanian universities. This review paper utilizes a quantitative approach and uses structural equation modeling for data analysis. The results revealed a modest prevalence range is more dependent on the cyberstalking type. The results also indicated that proximity to motivated offenders, suitable targets, and digital guardians significantly influences cyberstalking victimization. The outcome from moderation hypothesis testing demonstrated that age and residence have a significant effect on cyberstalking victimization. The proposed model is an essential element for assessing cyberstalking victimization among societies, which provides a valuable understanding of the prevalence of cyberstalking victimization. This can assist the researchers and practitioners for future research in the context of cyberstalking victimization

    Enrich Awareness of Users to Detect Phishing Websites

    No full text
    Phishing attack is used for identity theft with the help of social engineering and some sophisticated attacks. To attract the user by clicking a URL and is trapped to a phishing Web page. Security for user’s credentials is one of most important factor for organizations nowadays. It can be achieved through several ways like education and training. Through training and education the level of awareness will be increased also it helps to mitigate phishing. Approach with several steps is introduced in this paper, where a user must take a look or take these precautionary measures if the user is browsing any Web browser. We found it possible to detect Phishing Web pages without anti Phishing solutions. This approach contains several steps to examine whether the Web page is a real Web page or a fake Webpage. All these steps will check the phishing features exist in that Web page or not. For evaluation of our approach we analyzed the data set of Phish Tank, this data set is full of Phishing Web Pages. The purpose of evaluation is to check the features discussed in our approach to aware the user. From the following result it is resulted that the user can detect without using any Anti Phishing solution just by taking some steps to check the Web page for certain features

    Service-centric heterogeneous vehicular network modeling for connected traffic environments

    No full text
    Heterogeneous vehicular communication on the Internet of connected vehicle (IoV) environment is an emerging research theme toward achieving smart transportation. It is an evolution of the existing vehicular ad hoc network architecture due to the increasingly heterogeneous nature of the various existing networks in road traffic environments that need to be integrated. The existing literature on vehicular communication is lacking in the area of network optimization for heterogeneous network environments. In this context, this paper proposes a heterogeneous network model for IoV and service-oriented network optimization. The network model focuses on three key networking entities: vehicular cloud, heterogeneous communication, and smart use cases as clients. Most traffic-related data–oriented computations are performed at cloud servers for making intelligent decisions. The connection component enables handoff-centric network communication in heterogeneous vehicular environments. The use-case-oriented smart traffic services are implemented as clients for the network model. The model is tested for various service-oriented metrics in heterogeneous vehicular communication environments with the aim of affirming several service benefits. Future challenges and issues in heterogeneous IoV environments are also highlighted
    corecore