<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=phishing">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=phishing]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for phishing]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/112/Online-Health-Information"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1122/Data-Quality-and-Linguistic-Cues-for-Domain-independent-Deception-Detection"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/868/Phishing-in-an-academic-community-A-study-of-user-susceptibility-and-behavior"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/725/Detecting-Botnets-Using-a-Collaborative-Situational-aware-IDPS"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/713/Cybersecurity-Challenges-to-American-State-and-Local-Governments"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/112/Online-Health-Information">
  <title><![CDATA[Online Health Information]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/112/Online-Health-Information</link>
  <description><![CDATA[The rise of social media platforms as Online Health Information Sources (OHIS) has increased the spread of health misinformation in cyberspace. The rapid dissemination of false or misleading health information, particularly in public health, can have severe consequences. Misinformation not only endangers public health but also poses significant cybersecurity risks, including eroding trust in credible sources, enabling phishing attacks, and heightening the impact of cyber threats during crises...]]></description>
  <dc:date>2024-01-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1122/Data-Quality-and-Linguistic-Cues-for-Domain-independent-Deception-Detection">
  <title><![CDATA[Data Quality and Linguistic Cues for Domain-independent Deception Detection]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1122/Data-Quality-and-Linguistic-Cues-for-Domain-independent-Deception-Detection</link>
  <description><![CDATA[Deception is pervasive in today’s connected society and is being spread in a multitude of different forms with diverse goals, which we refer to as domains of deception. The most crucial research task in the field of deception is identification of deception, which in most cases involves a machine learning model making the binary classification of Deceptive or Not Deceptive. These classification models are very important as they can help protect the security of an organization by preventing p...]]></description>
  <dc:date>2022-12-06</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/868/Phishing-in-an-academic-community-A-study-of-user-susceptibility-and-behavior">
  <title><![CDATA[Phishing in an academic community: A study of user susceptibility and behavior]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/868/Phishing-in-an-academic-community-A-study-of-user-susceptibility-and-behavior</link>
  <description><![CDATA[We present an observational study on the relationship between demographic factors and phishing susceptibility at the University of Maryland, Baltimore County (UMBC). In spring 2018, we delivered phishing attacks to 450 randomly selected students on three different days (1,350 students total) to examine user click rates and demographics among UMBC’s undergraduates. Participants were initially unaware of the study. We deployed the billing problem, contest winner, and expiration date phishing ...]]></description>
  <dc:date>2019-08-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/725/Detecting-Botnets-Using-a-Collaborative-Situational-aware-IDPS">
  <title><![CDATA[Detecting Botnets Using a Collaborative Situational-aware IDPS]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/725/Detecting-Botnets-Using-a-Collaborative-Situational-aware-IDPS</link>
  <description><![CDATA[Botnet attacks turn susceptible victim computers into bots that perform various malicious activities while under the control of a botmaster. Some examples of the damage they cause include denial-of-service attacks, click fraud, spamware, and phishing. These attacks can vary in the type of architecture and communication protocol used, which might be modified during the botnet's lifespan. Intrusion detection and prevention systems are one way to safeguard the cyber-physical systems we use, but ...]]></description>
  <dc:date>2016-02-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/713/Cybersecurity-Challenges-to-American-State-and-Local-Governments">
  <title><![CDATA[Cybersecurity Challenges to American State and Local Governments]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/713/Cybersecurity-Challenges-to-American-State-and-Local-Governments</link>
  <description><![CDATA[In this paper, we examine cybersecurity challenges to American state and local governments. In particular, we address the extent and magnitude of cyberattacks against these governments, the problems these governments face in preventing attacks from being successful, the barriers to effective cybersecurity that they confront, and actions that they believe should be taken to improve cybersecurity practice.  Our research method consisted of a focus group of information technology (IT) and cybers...]]></description>
  <dc:date>2015-06-18</dc:date>
 </item>
</rdf:RDF>
