Learn More
In this paper, we study the effectiveness of phishing blacklists. We used 191 fresh phish that were less than 30 minutes old to conduct two tests on eight anti-phishing toolbars. We found that 63% of the phishing campaigns in our dataset lasted less than two hours. Blacklists were ineffective when protecting users initially, as most of them caught less than(More)
OBJECTIVE To understand the relations of mild traumatic brain injury (TBI), blast exposure, and brain white matter structure to severity of posttraumatic stress disorder (PTSD). DESIGN Nested cohort study using multivariate analyses. PARTICIPANTS Fifty-two OEF/OIF veterans who served in combat areas between 2001 and 2008 were studied approximately 4(More)
Phishing is a form of cybercrime where spammed emails and fraudulent websites entice victims to provide sensitive information to the phishers. The acquired sensitive information is subsequently used to steal identities or gain access to money. This paper explores the possibility of utilizing confidence weighted classification combined with content based(More)
The Department of Veterans Affairs (VA) uses the Neurobehavioral Symptom Inventory (NSI) to measure postconcussive symptoms in its comprehensive traumatic brain injury (TBI) evaluation. This study examined the NSI's item properties, internal consistency, and external validity. Data were obtained from a federally funded study of the experiences of combat(More)
In recent years, spam email has become a major tool for criminals to conduct illegal business on the Internet. Therefore, in this paper we describe a new research approach that uses data mining techniques to study spam emails with the focus on law enforcement forensic analysis. After we retrieve useful attributes from spam emails, we use a connected(More)
Phishing sites have become a common approach to steal sensitive information, such as usernames, passwords and credit card details of the internet users. We propose a semisupervised machine learning approach to detect phishing URLs from a set of phishing and spam URLs. Spam emails are the source of these URLs. In reality, the number of phishing URLs received(More)
OBJECTIVE To provide item analyses, estimates of temporal reliability and internal consistency, and examination of the sensitivity and specificity of a traumatic brain injury-screening tool. PARTICIPANTS Five hundred veterans of the wars in Iraq and Afghanistan enrolled in the study, approximately half of whom (248) volunteered. The remaining 252(More)
The timeliness of Phishing Incident Response is hindered by the need for human verification of whether suspicious URLs are actually phishing sites. This paper presents a method for automating the determination, and demonstrates the effectiveness of this method in reducing the number of suspicious URLs that need human review through a method of comparing new(More)
The purpose of this project is to assess how information technology (IT) is being implemented and managed in U.S. dental schools. Recent advances in IT have restructured many of the administrative, curricular, and clinical functions in dental schools. Purchasing hardware and software and hiring personnel to maintain IT present significant financial and(More)
—— Phishers continue to alter the source code of the web pages used in their attacks to mimic changes to legitimate websites of spoofed organizations and to avoid detection by phishing countermeasures. Manipulations can be as subtle as source code changes or as apparent as adding or removing significant content. To appropriately respond to these changes to(More)