![]() |
![]() Browsing Interface : Welcome guest : log in |
[
Home | 
Graph | 
LogLearn |
Editor |
]
KB:
Language:
Formal Language:
|
|
|
CommercialUnit
|
|
|
| appearance as argument number 1 |
|
|
| (subclass Phishing Defrauding) | ComputingBrands.kif 4132-4132 | Phishing is a subclass of defrauding |
| (documentation Phishing EnglishLanguage "A Defrauding in which the fraudster tries to obtain private information of some value by false pretenses. A typical scam is a message masquerading as being from a company with which the victim already does business, saying that resetting the victim's password is required, when then directs the victim to the fraudster's website where the victim's password is captured.") | ComputingBrands.kif 4133-4137 | Phishing is a subclass of defrauding |
| appearance as argument number 2 |
|
|
| (termFormat EnglishLanguage Phishing "phishing") | ComputingBrands.kif 4139-4139 |
| antecedent |
|
|
| (=> (instance ?P Phishing) (exists (?FS ?V ?M ?I) (and (instance ?M Communication) (origin ?M ?FS) (agent ?P ?FS) (destination ?M ?V) (instance ?I Formula) (knows ?V ?I) (not (desires ?V (knows ?FS ?I))) (desires ?FS (knows ?FS ?I))))) |
ComputingBrands.kif 4141-4155 | If X is an instance of phishing, then All of the following hold: (1) there exist Y, Z,, , W (2) V such that W is an instance of communication (3) W originates at Y (4) Y is an agent of X (5) W ends up at Z (6) V is an instance of formula (7) Z knows V (8) Z doesn't desire Y doesn't know V (9) Y desires Y knows V |