Skip to main content

Showing 1–14 of 14 results for author: Jones, K S

.
  1. arXiv:2404.09802  [pdf, other

    cs.CR cs.LG

    The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs

    Authors: Saroj Gopali, Akbar S. Namin, Faranak Abri, Keith S. Jones

    Abstract: Cyber attacks continue to pose significant threats to individuals and organizations, stealing sensitive data such as personally identifiable information, financial information, and login credentials. Hence, detecting malicious websites before they cause any harm is critical to preventing fraud and monetary loss. To address the increasing number of phishing attacks, protective mechanisms must be hi… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

  2. Humble planar defects in SiGe nanopillars

    Authors: Hongbin Yang, Shang Ren, Sobhit Singh, Emily M. Turner, Kevin S. Jones, Philip E. Batson, David Vanderbilt, Eric Garfunkel

    Abstract: We report a new \{001\} planar defect found in SiGe nanopillars. The defect structure, determined by atomic resolution electron microscopy, matches the Humble defect model proposed for diamond. We also investigated several possible variants of the Humble structure using first principles calculations and found that the one lowest in energy was also in best agreement with the STEM images. The pillar… ▽ More

    Submitted 7 November, 2021; originally announced November 2021.

  3. arXiv:2106.01998  [pdf, other

    cs.HC cs.AI cs.CR

    Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks

    Authors: Faranak Abri, Luis Felipe Gutierrez, Chaitra T. Kulkarni, Akbar Siami Namin, Keith S. Jones

    Abstract: To understand how end-users conceptualize consequences of cyber security attacks, we performed a card sorting study, a well-known technique in Cognitive Sciences, where participants were free to group the given consequences of chosen cyber attacks into as many categories as they wished using rationales they see fit. The results of the open card sorting study showed a large amount of inter-particip… ▽ More

    Submitted 3 June, 2021; originally announced June 2021.

    Comments: 20 pages, 3 figures, COMPSAC'21

  4. arXiv:2012.14488  [pdf, other

    cs.CR cs.LG

    Phishing Detection through Email Embeddings

    Authors: Luis Felipe GutiƩrrez, Faranak Abri, Miriam Armstrong, Akbar Siami Namin, Keith S. Jones

    Abstract: The problem of detecting phishing emails through machine learning techniques has been discussed extensively in the literature. Conventional and state-of-the-art machine learning algorithms have demonstrated the possibility of building classifiers with high accuracy. The existing research studies treat phishing and genuine emails through general indicators and thus it is not exactly clear what phis… ▽ More

    Submitted 28 December, 2020; originally announced December 2020.

  5. arXiv:2012.02643  [pdf, other

    cs.SD cs.CV eess.AS

    Predicting Emotions Perceived from Sounds

    Authors: Faranak Abri, Luis Felipe GutiƩrrez, Akbar Siami Namin, David R. W. Sears, Keith S. Jones

    Abstract: Sonification is the science of communication of data and events to users through sounds. Auditory icons, earcons, and speech are the common auditory display schemes utilized in sonification, or more specifically in the use of audio to convey information. Once the captured data are perceived, their meanings, and more importantly, intentions can be interpreted more easily and thus can be employed as… ▽ More

    Submitted 4 December, 2020; originally announced December 2020.

    Comments: 10 pages

  6. arXiv:2012.00648  [pdf, other

    cs.CR cs.HC

    Cyber-Attack Consequence Prediction

    Authors: Prerit Datta, Natalie Lodinger, Akbar Siami Namin, Keith S. Jones

    Abstract: Cyber-physical systems posit a complex number of security challenges due to interconnection of heterogeneous devices having limited processing, communication, and power capabilities. Additionally, the conglomeration of both physical and cyber-space further makes it difficult to devise a single security plan spanning both these spaces. Cyber-security researchers are often overloaded with a variety… ▽ More

    Submitted 2 December, 2020; v1 submitted 1 December, 2020; originally announced December 2020.

    Comments: 9 pages. The pre-print of a paper to appear in the proceedings of the 3rd Workshop on Big Data Engineering and Analytics in Cyber-Physical Systems (BigEACPS'20), IEEE BigData Conference 2020

  7. arXiv:2010.04260  [pdf, other

    cs.CL cs.IR

    Fake Reviews Detection through Analysis of Linguistic Features

    Authors: Faranak Abri, Luis Felipe Gutierrez, Akbar Siami Namin, Keith S. Jones, David R. W. Sears

    Abstract: Online reviews play an integral part for success or failure of businesses. Prior to purchasing services or goods, customers first review the online comments submitted by previous customers. However, it is possible to superficially boost or hinder some businesses through posting counterfeit and fake reviews. This paper explores a natural language processing approach to identify fake reviews. We pre… ▽ More

    Submitted 8 October, 2020; originally announced October 2020.

    Comments: The pre-print of a paper to appear in the proceedings of the IEEE International Conference on Machine Learning Applications (ICMLA 2020), 11 pages, 3 figures, 5 tables

  8. arXiv:2006.07914  [pdf, other

    cs.CR cs.NI

    Cloud as an Attack Platform

    Authors: Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones

    Abstract: We present an exploratory study of responses from $75$ security professionals and ethical hackers in order to understand how they abuse cloud platforms for attack purposes. The participants were recruited at the Black Hat and DEF CON conferences. We presented the participants' with various attack scenarios and asked them to explain the steps they would have carried out for launching the attack in… ▽ More

    Submitted 14 June, 2020; originally announced June 2020.

  9. arXiv:2006.07912  [pdf, other

    cs.LG cs.SI

    Fake Reviews Detection through Ensemble Learning

    Authors: Luis Gutierrez-Espinoza, Faranak Abri, Akbar Siami Namin, Keith S. Jones, David R. W. Sears

    Abstract: Customers represent their satisfactions of consuming products by sharing their experiences through the utilization of online reviews. Several machine learning-based approaches can automatically detect deceptive and fake reviews. Recently, there have been studies reporting the performance of ensemble learning-based approaches in comparison to conventional machine learning techniques. Motivated by t… ▽ More

    Submitted 14 June, 2020; originally announced June 2020.

  10. arXiv:2006.07908  [pdf, other

    cs.CR cs.NI

    Launching Stealth Attacks using Cloud

    Authors: Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones

    Abstract: Cloud computing offers users scalable platforms and low resource cost. At the same time, the off-site location of the resources of this service model makes it more vulnerable to certain types of adversarial actions. Cloud computing has not only gained major user base, but also, it has the features that attackers can leverage to remain anonymous and stealth. With convenient access to data and techn… ▽ More

    Submitted 14 June, 2020; originally announced June 2020.

  11. arXiv:1805.08272  [pdf

    cs.CR cs.CY

    The Sounds of Cyber Threats

    Authors: Akbar Siami Namin, Rattikorn Hewett, Keith S. Jones, Rona Pogrund

    Abstract: The Internet enables users to access vast resources, but it can also expose users to harmful cyber-attacks. This paper investigates human factors issues concerning the use of sounds in a cyber-security domain. It describes a methodology, referred to as sonification, to effectively design and develop auditory cyber-security threat indicators to warn users about cyber-attacks. A case study is presen… ▽ More

    Submitted 21 May, 2018; originally announced May 2018.

    Comments: 5 pages, 3 figures, 1 table, A poster paper presented at the 12th Symposium on Usable Privacy and Security (SOUPS 2016)

    ACM Class: H.5.2

  12. Automatic summarising: factors and directions

    Authors: Karen Sparck Jones

    Abstract: This position paper suggests that progress with automatic summarising demands a better research methodology and a carefully focussed research strategy. In order to develop effective procedures it is necessary to identify and respond to the context factors, i.e. input, purpose, and output factors, that bear on summarising and its evaluation. The paper analyses and illustrates these factors and th… ▽ More

    Submitted 29 May, 1998; originally announced May 1998.

  13. How much has information technology contributed to linguistics?

    Authors: Karen Sparck Jones

    Abstract: Information technology should have much to offer linguistics, not only through the opportunities offered by large-scale data analysis and the stimulus to develop formal computational models, but through the chance to use language in systems for automatic natural language processing. The paper discusses these possibilities in detail, and then examines the actual work that has been done. It is evi… ▽ More

    Submitted 17 February, 1997; originally announced February 1997.

    Comments: Prepared for a British Academy Symposium on Information Technology and Scholarly Disciplines

  14. Natural language processing: she needs something old and something new (maybe something borrowed and something blue, too)

    Authors: Karen Sparck Jones

    Abstract: Given the present state of work in natural language processing, this address argues first, that advance in both science and applications requires a revival of concern about what language is about, broadly speaking the world; and second, that an attack on the summarising task, which is made ever more important by the growth of electronic text resources and requires an understanding of the role of… ▽ More

    Submitted 21 December, 1995; originally announced December 1995.

    Comments: Presidential Address, 1994, Association for Computational Linguistics