scholarly journals Phish-Shelter

2022 ◽  
Vol 15 (1) ◽  
pp. 1-23
Author(s):  
Rizwan Ur Rahman ◽  
Lokesh Yadav ◽  
Deepak Singh Tomar

Phishing attack is a deceitful attempt to steal the confidential data such as credit card information, and account passwords. In this paper, Phish-Shelter, a novel anti-phishing browser is developed, which analyzes the URL and the content of phishing page. Phish-Shelter is based on combined supervised machine learning model.Phish-Shelter browser uses two novel feature set, which are used to determine the web page identity. The proposed feature sets include eight features to evaluate the obfuscation-based rule, and eight features to identify search engine. Further, we have taken eleven features which are used to discover contents, and blacklist based rule. Phish-Shelter exploited matching identity features, which determines the degree of similarity of a URL with the blacklisted URLs. Proposed features are independent from third-party services such as web browser history or search engines result. The experimental results indicate that, there is a significant improvement in detection accuracy using proposed features over traditional features.

Web browsers may delete some files but it doesn’t delete everything. The purpose of private browsing is for users to browse private mode just as a standard browsing session would, but without storing any data such as log-in credentials or browsing history upon exit. A secure framework to secure the web browser artefacts is proposed to fulfil the requirements. In order to compare and contrast the different methods of artefacts encryption, a hybrid method was introduced; Base64 + AES on the prototype. The test systems were created by utilising virtual machines. The prototype was developed using C# language in Microsoft Visual Studio application that runs on Windows. To provide countermeasures, this research proposes an implementation of a third-party privacy application, called PRINDOW, to improve security in hiding a user's browsing activity. Every browsing session is recorded and scanned using the prototype. This method allows only the base requirements to be installed on the virtual machine for each file with the cryptographic method. This framework could theoretically enhance current practises by making slight changes to the web browser's application structure.


2017 ◽  
Vol 11 (2) ◽  
pp. 49-63 ◽  
Author(s):  
Harshad Suryakant Wadkar ◽  
Arun Mishra ◽  
Arati M. Dixit

In last few decades, web browser has become one of the most used computer applications. The web browser is available on many devices such as desktops, laptops, palm devices and even in cars. According to recent research reports, the browser is targeted most by exploits in attacks on both home and corporate users. The default browser security configuration may leak user's sensitive information. It may also give remote code execution facility to attacker. In this paper, a framework to detect web browser security misconfiguration is proposed. The misconfiguration leads to data sharing to third party and insecure data transfer. The system scans browser configuration and determine deviation of configuration from secure settings. In addition, the system provides facility to achieve the level of security configuration with respect to recommended settings.


2012 ◽  
pp. 239-273
Author(s):  
Sarah Vert

This chapter focuses on the Internet working environment of Knowledge Workers through the customization of the Web browser on their computer. Given that a Web browser is designed to be used by anyone browsing the Internet, its initial configuration must meet generic needs such as reading a Web page, searching for information, and bookmarking. In the absence of a universal solution that meets the specific needs of each user, browser developers offer additional programs known as extensions, or add-ons. Among the various browsers that can be modified with add-ons, Mozilla’s Firefox is perhaps the one that first springs to mind; indeed, Mozilla has built the Firefox brand around these extensions. Using this example, and also considering the browsers Google Chrome, Internet Explorer, Opera and Safari, the author will attempt to demonstrate the potential of Web browsers in terms of the resources they can offer when they are customizable and available within the working environment of a Knowledge Worker.


Author(s):  
James T. Robinson ◽  
Helga Thorvaldsdóttir ◽  
Douglass Turner ◽  
Jill P. Mesirov

Abstractigv.js is an embeddable JavaScript implementation of the Integrative Genomics Viewer (IGV). It can be easily dropped into any web page with a single line of code and has no external dependencies. The viewer runs completely in the web browser, with no backend server and no data pre-processing required.


2000 ◽  
Vol 6 (S2) ◽  
pp. 278-279
Author(s):  
Robert A. Grassucci ◽  
Joachim Frank

Training of students, postdocs and scientists in the techniques and instrumentation of Cryo-electron microscopy has many challenges. This is especially the case at the Wadsworth center where there are a variety of techniques as well as instruments to choose from, each of them having certain nuances that need to be recognized before they can be fully taken advantage of. There are also users with many levels of experience that need to be trained to use the equipment and techniques effectively. For this reason we have chosen to incorporate many of the protocols which are used into an internal web page. The web browser is a very effective tool for conveying detailed information on a variety of levels.A novice user is asked to go through the EM training web page (Figure 1) and then select the Philips EM420 use link to get a feel for the steps that will be involved to set up and operate the microscope.


2013 ◽  
Vol 18 (2-3) ◽  
pp. 61-70
Author(s):  
Mirosław Jabłoński

Abstract In the paper, the subsystem for graphical visualization of semantic messages has been proposed and configuration dataflow has been described. The key problem in 3D object rendering over video camera image is fusion of parameters collected during camera calibration and pose estimation with models of visualized objects. Pose estimation results and transformation matrix setup were described. Proposed system has been developed in HTML5 internet web page format that uses portable JavaScript language and WebGL library that make use of GPU device. Presented prototype can be used by a web browser on desktop PC as well as on mobile device. No third-party software is necessary.


2020 ◽  
Author(s):  
Inge M. N. Wortel ◽  
Johannes Textor

AbstractSummaryThe Cellular Potts Model (CPM) is a powerful in silico method for simulating diverse biological processes at tissue scale. Because of its inherently graphical nature, this model should in theory be accessible to a large audience of biologists – without requiring extensive mathematical expertise. But in practice, CPMs are mostly implemented in specialized frameworks that users need to master before they can run and modify the simulation. We here present Artistoo (Artificial Tissue Toolbox), a JavaScript library for building “explorable” CPM simulations where users can change model parameters and see their effects in real time. Artistoo simulations run directly in the web browser and do not require any third-party software, plugins, or back-end servers. Although implemented in JavaScript, Artistoo does not suffer from a major performance loss compared to frameworks written in C++; it remains sufficiently fast to let users interact with simulations in real time. Artistoo provides an opportunity to unlock CPM models for a broader audience: interactive simulations can be shared through a simple URL in a zero-install setting. We discuss how such model sharing may benefit modelling research, science dissemination, open science, and education.Availability and ImplementationArtistoo is an open-source library released under the MIT license, and is freely available on GitHub at https://github.com/ingewortel/[email protected]


Phishing attack is used for identity theft with the help of social engineering and some sophisticated attacks. To attract the user by clicking a URL and is trapped to a phishing Web page. Security for user’s credentials is one of most important factor for organizations nowadays. It can be achieved through several ways like education and training. Through training and education the level of awareness will be increased also it helps to mitigate phishing. Approach with several steps is introduced in this paper, where a user must take a look or take these precautionary measures if the user is browsing any Web browser. We found it possible to detect Phishing Web pages without anti Phishing solutions. This approach contains several steps to examine whether the Web page is a real Web page or a fake Webpage. All these steps will check the phishing features exist in that Web page or not. For evaluation of our approach we analyzed the data set of Phish Tank, this data set is full of Phishing Web Pages. The purpose of evaluation is to check the features discussed in our approach to aware the user. From the following result it is resulted that the user can detect without using any Anti Phishing solution just by taking some steps to check the Web page for certain features.


eLife ◽  
2021 ◽  
Vol 10 ◽  
Author(s):  
Inge M N Wortel ◽  
Johannes Textor

The Cellular Potts Model (CPM) is a powerful in silico method for simulating biological processes at tissue scale. Their inherently graphical nature makes CPMs very accessible in theory, but in practice, they are mostly implemented in specialised frameworks users need to master before they can run simulations. We here present Artistoo (Artificial Tissue Toolbox), a JavaScript library for building 'explorable' CPM simulations where viewers can change parameters interactively, exploring their effects in real time. Simulations run directly in the web browser and do not require third-party software, plugins, or back-end servers. The JavaScript implementation imposes no major performance loss compared to frameworks written in C++; Artistoo remains sufficiently fast for interactive, real time simulations. Artistoo provides an opportunity to unlock CPM models for a broader audience: Interactive simulations can be shared via a URL in a zero-install setting. We discuss applications in CPM research, science dissemination, open science, and education.


2008 ◽  
Vol 18 (1) ◽  
pp. 9-20 ◽  
Author(s):  
Mark Kander ◽  
Steve White

Abstract This article explains the development and use of ICD-9-CM diagnosis codes, CPT procedure codes, and HCPCS supply/device codes. Examples of appropriate coding combinations, and Coding rules adopted by most third party payers are given. Additionally, references for complete code lists on the Web and a list of voice-related CPT code edits are included. The reader is given adequate information to report an evaluation or treatment session with accurate diagnosis, procedure, and supply/device codes. Speech-language pathologists can accurately code services when given adequate resources and rules and are encouraged to insert relevant codes in the medical record rather than depend on billing personnel to accurately provide this information. Consultation is available from the Division 3 Reimbursement Committee members and from [email protected] .


Sign in / Sign up

Export Citation Format

Share Document