NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Yihe Zhang – ProQuest LLC, 2024
Machine learning (ML) techniques have been successfully applied to a wide array of applications. This dissertation aims to take application data handling into account when developing ML-based solutions for real-world problems through a holistic framework. To demonstrate the generality of our framework, we consider two real-world applications: spam…
Descriptors: Artificial Intelligence, Problem Solving, Social Media, Computer Mediated Communication
Jackie Christopher Scott – ProQuest LLC, 2023
Although there have been numerous technological advancements in the last several years, there continues to be a real threat as it pertains to social engineering, especially phishing, spear-phishing, and Business Email Compromise (BEC). While the technologies to protect corporate employees and network borders have gotten better, there are still…
Descriptors: Information Security, Computer Mediated Communication, Electronic Mail, Computer Science Education
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis