Learn More
To protect users from phishing attacks system designers and security professionals need to understand how users interact with those attacks and be able to predict userspsila behaviours in a given situation. In this paper we introduce the first model to visualise user-phishing interaction. We present a method to accurately describe userspsila perceptions in(More)
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach to detect phishing websites based on analysis of userspsila online behaviours - i.e., the websites users have visited, and the data users have submitted to those websites. Such user behaviours can not be(More)
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites based on analysis of users’ online behaviours— i.e., the websites users have visited, and the data users have submitted to those websites. Such user behaviours can not be(More)
An affine projection π : P p → Qq of convex polytopes induces an inclusion map of the face posets i : F(Q) → F(P ). We define an order-preserving map of posets h : F(P ) → Suspp−qF(Q) such that for any filter J of Suspp−qF(Q), the map h restricts to a homotopy equivalence between the order complexes of h−1(J) and J . As applications we prove (1) A(More)
It is well known that the time average or the center of mass for generic orbits of the standard tent map is 0.5. In this paper we show some interesting properties of the exceptional orbits, including periodic orbits, orbits without mass center, and orbits with mass centers different from 0.5. We prove that for any positive integer n, there exist n distinct(More)