Search results
Results From The WOW.Com Content Network
URL Dataset 120 days of URL data from a large conference. Many features of each URL are given. 2,396,130 Text Classification 2009 [447] [448] J. Ma Phishing Websites Dataset Dataset of phishing websites. Many features of each site are given. 2456 Text Classification 2015 [449] R. Mustafa et al. Online Retail Dataset
THz and thermal video data set This multispectral data set includes terahertz, thermal, visual, near infrared, and three-dimensional videos of objects hidden under people's clothes. 3D lookup tables are provided that allow you to project images onto 3D point clouds. More than 20 videos.
Anti-phishing software consists of computer programs that attempt to identify phishing content contained in websites, e-mail, or other forms used to accessing data (usually from the internet) [1] and block the content, usually with a warning to the user (and often an option to view the content regardless).
Common Crawl is a nonprofit 501(c)(3) organization that crawls the web and freely provides its archives and datasets to the public. [ 1 ] [ 2 ] Common Crawl's web archive consists of petabytes of data collected since 2008. [ 3 ]
Attack trees are conceptual diagrams showing how an asset, or target, might be attacked. [1] Attack trees have been used in a variety of applications. In the field of information technology, they have been used to describe threats on computer systems and possible attacks to realize those threats. However, their use is not restricted to the ...
Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware.
Phishing scams usually tell a story to trick you into clicking on a link or opening an attachment, the FTC explains. These emails and texts can say or include things such as: These emails and ...
Typosquatting, also called URL hijacking, a sting site, a cousin domain, or a fake URL, is a form of cybersquatting, and possibly brandjacking which relies on mistakes such as typos made by Internet users when inputting a website address into a web browser. A user accidentally entering an incorrect website address may be led to any URL ...