As the Internet becomes more pervasive in all areas of human activity, attackers can use the anonymity of cyberspace to commit crimes and compromise the IT infrastructure. As currently there is no generally implemented authentification technology we have to monitor the content and relations of messages and Internet traffic to detect infringements. In this paper, we present recent research on Internet threats such as fraud or hampering critical information infrastructure. One approach concentrates on the rapid detection of phishing email, designed to make it next to impossible for attackers to obtain financial resources or commit identity theft in this way. Then we address how another type of Internet fraud, the violation of the rights of tr...
Machine learning (ML) provides popular tools for data analysis. It has as of late indicated promisin...
Data mining techniques, while allowing the individuals to extract hidden knowledge on one hand, intr...
The web has turned into a principal part of our conventional social and financial activities. The we...
Nowadays, information and communication technologies have been used to support and control almost ev...
Online criminals have adapted traditional snail mail and door-to-door fraudulent schemes into electr...
Phishing is a fraudulent activity that includes tricking people into disclosing personal or financia...
The concept of exchanging goods and services over the Internet has seen an exponential growth in pop...
The social engineering strategy, used by cyber criminals, to get confidential information from Inter...
The Internet has become an essential component of our everyday social and financial activities. Inte...
Phishing is a criminal technique employing both social engineering and technical subterfuge to steal...
Society of today is becoming increasingly dependent on the availability and correctness of IT-system...
Classification Data Mining (DM) Techniques can be a very useful tool in detecting and identifying e-...
The 9/11 terrorists, before their deadly attacks, sought invisibility through integration into the s...
The rapid growth of the internet is transforming how we engage and communicate. It also creates new ...
Phishing attacks are deceptive types of social engineering techniques that attackers use to imitate ...
Machine learning (ML) provides popular tools for data analysis. It has as of late indicated promisin...
Data mining techniques, while allowing the individuals to extract hidden knowledge on one hand, intr...
The web has turned into a principal part of our conventional social and financial activities. The we...
Nowadays, information and communication technologies have been used to support and control almost ev...
Online criminals have adapted traditional snail mail and door-to-door fraudulent schemes into electr...
Phishing is a fraudulent activity that includes tricking people into disclosing personal or financia...
The concept of exchanging goods and services over the Internet has seen an exponential growth in pop...
The social engineering strategy, used by cyber criminals, to get confidential information from Inter...
The Internet has become an essential component of our everyday social and financial activities. Inte...
Phishing is a criminal technique employing both social engineering and technical subterfuge to steal...
Society of today is becoming increasingly dependent on the availability and correctness of IT-system...
Classification Data Mining (DM) Techniques can be a very useful tool in detecting and identifying e-...
The 9/11 terrorists, before their deadly attacks, sought invisibility through integration into the s...
The rapid growth of the internet is transforming how we engage and communicate. It also creates new ...
Phishing attacks are deceptive types of social engineering techniques that attackers use to imitate ...
Machine learning (ML) provides popular tools for data analysis. It has as of late indicated promisin...
Data mining techniques, while allowing the individuals to extract hidden knowledge on one hand, intr...
The web has turned into a principal part of our conventional social and financial activities. The we...