Date


Research Areas

Output Type

Download Available

Dewey Decimal

3 results

Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach

Conference Proceeding
Christou, O., Pitropakis, N., Papadopoulos, P., Mckeown, S., & Buchanan, W. J. (2020)
Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach. In Proceedings of the 6th International Conference on Information Systems Security and Privacy. , (289-298). https://doi.org/10.5220/0008902202890298
Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high ...

Microtargeting or Microphishing? Phishing Unveiled

Conference Proceeding
Khursheed, B., Pitropakis, N., McKeown, S., & Lambrinoudakis, C. (2020)
Microtargeting or Microphishing? Phishing Unveiled. In Trust, Privacy and Security in Digital Business. , (89-105). https://doi.org/10.1007/978-3-030-58986-8_7
Online advertisements delivered via social media platforms function in a similar way to phishing emails. In recent years there has been a growing awareness that political adve...

Testing And Hardening IoT Devices Against the Mirai Botnet

Conference Proceeding
Kelly, C., Pitropakis, N., McKeown, S., & Lambrinoudakis, C. (2020)
Testing And Hardening IoT Devices Against the Mirai Botnet. https://doi.org/10.1109/CyberSecurity49315.2020.9138887
A large majority of cheap Internet of Things (IoT) devices that arrive brand new, and are configured with out-of-the-box settings, are not being properly secured by the manufa...