The number of phishing websites is increasing, and the methods used to direct users to these sites are becoming more diverse. As web push notifications become more widespread, adversaries have begun using them as a me...
详细信息
In neurosurgery to remove brain tumors, DICOM data, a medical imaging standard, is generated preoperatively using CT and MRI. This data is used for surgical planning. However, brain deformation problems, known as brai...
详细信息
We developed an AI for Facial Expression Estimation to predict driver drowsiness levels, mimicking human evaluation. Traditional Image-based AIs struggle with limited data generalization in drowsiness prediction. Our ...
详细信息
This study deals with structural coloration caused the optical properties having multiple reflection peaks. Getting the dominant wavelengths and the color coordinates in sRGB color space from the reflection by thin la...
详细信息
In this paper, we experimentally evaluate the performance of a method for theoretically analysing the synchronized behaviour of two metronomes on a hanging plate using the describing function approach, proposed in our...
详细信息
Food volume prediction is critical for calculating calories in food analysis and nutritional evaluation. However, obtaining data and measuring volume from the 3D sensor camera concurrently is time-consuming. Additiona...
详细信息
Software testing is an essential activity for developing and maintaining high-quality software. Unit testing with test code (test cases) is a fundamental testing activity, and developers can test their production code...
详细信息
CONTEXT: Web applications are exposed to malicious accesses through the Internet. SQL injection (SQLi) attacks are still a typical threat to web application providers. Although recent studies proposed deep learning-ba...
详细信息
The number of phishing websites is increasing, and the methods used to direct users to these sites are becoming more diverse. As web push notifications become more widespread, adversaries have begun using them as a me...
详细信息
ISBN:
(数字)9798331540289
ISBN:
(纸本)9798331540296
The number of phishing websites is increasing, and the methods used to direct users to these sites are becoming more diverse. As web push notifications become more widespread, adversaries have begun using them as a method to direct users to phishing websites, known as phishing web push notifications. While protection against other phishing methods has been widely studied, countermeasures against phishing web push notifications remain an ongoing research topic. In this paper, we explore a method to control the display of web push notifications to protect users from phishing attempts. To minimize the cost of implementing and introducing the control mechanism, we utilized a browser extension to manage the display of web push notifications. We employed a keyword-based approach to detect and prevent the display of suspicious web push notifications. Our experimental results demonstrated that the proposed method effectively blocks phishing notifications.
Strong stabilization refers to designing stable feedback controllers that stabilize a given plant. The second-order stable stabilizing controller design of two-link underactuated planar robots around their UEP (Uprigh...
详细信息
暂无评论