The paper proposes a new metadata model (VandA) directed to support innovative exploitation of Historical AV Archives content. After an analysis of the needs of traditional and po...
Giuseppe Amato, Donatella Castelli, Paola Venerosi
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
Users are storing ever-increasing amounts of information digitally, driven by many factors including government regulations and the public’s desire to digitally record their per...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller,...
Typically, spam filters are built on the assumption that the characteristics of e-mails in the training set is identical to those in individual users’ inboxes on which it will b...
Educational materials designed to teach users not to fall for phishing attacks are widely available but are often ignored by users. In this paper, we extend an embedded training m...
Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sh...