A Machine Learning Approach to Phishing Detection and Defense

Written By I. S. Amiri
A Machine Learning Approach to Phishing Detection and Defense
  • Publsiher : Syngress Publishing
  • Release : 08 December 2014
  • ISBN : 9780128029275
  • Pages : 100 pages
  • Rating : 4/5 from 21 reviews
GET THIS BOOKA Machine Learning Approach to Phishing Detection and Defense


Read or download book entitled A Machine Learning Approach to Phishing Detection and Defense written by I. S. Amiri which was release on 08 December 2014, this book published by Syngress Publishing. Available in PDF, EPUB and Kindle Format. Book excerpt: Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats. Discover novel research into the uses of machine-learning principles and algorithms to detect and prevent phishing attacks Help your business or organization avoid costly damage from phishing sources Gain insight into machine-learning strategies for facing a variety of information security threats

A Machine Learning Approach to Phishing Detection and Defense

A Machine Learning Approach to Phishing Detection and Defense
  • Author : I. S. Amiri,O. A. Akanbi,Elahe Fazeldehkordi
  • Publisher : Syngress Publishing
  • Release Date : 2014-12-08
  • Total pages : 100
  • ISBN : 9780128029275
GET BOOK

Summary : Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense ...

A Machine Learning Approach to Phishing Detection and Defense

A Machine Learning Approach to Phishing Detection and Defense
  • Author : Iraj Sadegh Amiri,O.A. Akanbi,E. Fazeldehkordi
  • Publisher : Syngress
  • Release Date : 2014-12-05
  • Total pages : 100
  • ISBN : 9780128029275
GET BOOK

Summary : Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense ...

Handbook of Research on Cyber Approaches to Public Administration and Social Policy

Handbook of Research on Cyber Approaches to Public Administration and Social Policy
  • Author : Özsungur, Fahri
  • Publisher : IGI Global
  • Release Date : 2022-06-10
  • Total pages : 692
  • ISBN : 9780128029275
GET BOOK

Summary : During the COVID-19 era, the functions of social policy and public administration have undergone a meaningful change, especially with the advancement of digital elements and online and virtual functions. Cyber developments, cyber threats, and the effects of cyberwar on the public administrations of countries have become critical research subjects, and ...

Machine Learning in Image Analysis and Pattern Recognition

Machine Learning in Image Analysis and Pattern Recognition
  • Author : Munish Kumar , R. K. Sharma,Ishwar Sethi
  • Publisher : MDPI
  • Release Date : 2021-09-08
  • Total pages : 112
  • ISBN : 9780128029275
GET BOOK

Summary : This book is to chart the progress in applying machine learning, including deep learning, to a broad range of image analysis and pattern recognition problems and applications. In this book, we have assembled original research articles making unique contributions to the theory, methodology and applications of machine learning in image ...

Artificial Cognitive Architecture with Self Learning and Self Optimization Capabilities

Artificial Cognitive Architecture with Self Learning and Self Optimization Capabilities
  • Author : Gerardo Beruvides
  • Publisher : Springer
  • Release Date : 2018-12-14
  • Total pages : 195
  • ISBN : 9780128029275
GET BOOK

Summary : This book introduces three key issues: (i) development of a gradient-free method to enable multi-objective self-optimization; (ii) development of a reinforcement learning strategy to carry out self-learning and finally, (iii) experimental evaluation and validation in two micromachining processes (i.e., micro-milling and micro-drilling). The computational architecture (modular, network and reconfigurable ...

Problems of science and practice tasks and ways to solve them

Problems of science and practice  tasks and ways to solve them
  • Author : Anonim
  • Publisher : International Science Group
  • Release Date : 2022-03-22
  • Total pages : 428
  • ISBN : 9780128029275
GET BOOK

Summary : Proceedings of the ХI International Scientific and Practical Conference...

Computational Collective Intelligence

Computational Collective Intelligence
  • Author : Manuel Núñez,Ngoc Thanh Nguyen,David Camacho,Bogdan Trawiński
  • Publisher : Springer
  • Release Date : 2015-09-09
  • Total pages : 661
  • ISBN : 9780128029275
GET BOOK

Summary : This two-volume set (LNAI 9329 and LNAI 9330) constitutes the refereed proceedings of the 7th International Conference on Collective Intelligence, ICCCI 2014, held in Madrid, Spain, in September 2015. The 110 full papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as multi-agent systems; social networks and NLP; ...

Integrated Micro Ring Photonics

Integrated Micro Ring Photonics
  • Author : Iraj Sadegh Amiri,Abdolkarim Afroozeh,Harith Ahmad
  • Publisher : CRC Press
  • Release Date : 2016-12-08
  • Total pages : 164
  • ISBN : 9780128029275
GET BOOK

Summary : Micro-ring resonators (MRRs) are employed to generate signals used for optical communication applications, where they can be integrated in a single system. These structures are ideal candidates for very large-scale integrated (VLSI) photonic circuits, since they provide a wide range of optical signal processing functions while being ultra-compact. Soliton pulses ...

Developments and Advances in Defense and Security

Developments and Advances in Defense and Security
  • Author : Álvaro Rocha,Robson Pacheco Pereira
  • Publisher : Springer
  • Release Date : 2019-06-13
  • Total pages : 534
  • ISBN : 9780128029275
GET BOOK

Summary : This book gathers the proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS), held at the Military Engineering Institute, Rio de Janeiro, Brazil, from 8 to 10th May 2019. It covers a variety of topics in systems, communication and defense; strategy and political-administrative vision in defense; and ...

Advanced Practical Approaches to Web Mining Techniques and Application

Advanced Practical Approaches to Web Mining Techniques and Application
  • Author : Obaid, Ahmed J.,Polkowski, Zdzislaw,Bhushan, Bharat
  • Publisher : IGI Global
  • Release Date : 2022-03-18
  • Total pages : 357
  • ISBN : 9780128029275
GET BOOK

Summary : The rapid increase of web pages has introduced new challenges for many organizations as they attempt to extract information from a massive corpus of web pages. Finding relevant information, eliminating irregular content, and retrieving accurate results has become extremely difficult in today’s world where there is a surplus of ...

Mobile Malware Attacks and Defense

Mobile Malware Attacks and Defense
  • Author : Ken Dunham
  • Publisher : Syngress
  • Release Date : 2008-11-12
  • Total pages : 440
  • ISBN : 9780128029275
GET BOOK

Summary : Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, ...

Data and Applications Security and Privacy XXXIII

Data and Applications Security and Privacy XXXIII
  • Author : Simon N. Foley
  • Publisher : Springer
  • Release Date : 2019-07-04
  • Total pages : 419
  • ISBN : 9780128029275
GET BOOK

Summary : This book constitutes the refereed proceedings of the 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2019, held in Charleston, SC, USA, in July 2018. The 21 full papers presented were carefully reviewed and selected from 52 submissions. The papers present high-quality original research from academia, industry, and government ...

Intelligent Systems and Applications

Intelligent Systems and Applications
  • Author : Kohei Arai,Supriya Kapoor,Rahul Bhatia
  • Publisher : Springer Nature
  • Release Date : 2020-08-25
  • Total pages : 783
  • ISBN : 9780128029275
GET BOOK

Summary : The book Intelligent Systems and Applications - Proceedings of the 2020 Intelligent Systems Conference is a remarkable collection of chapters covering a wider range of topics in areas of intelligent systems and artificial intelligence and their applications to the real world. The Conference attracted a total of 545 submissions from many academic ...

Machine Learning for Computer and Cyber Security

Machine Learning for Computer and Cyber Security
  • Author : Brij B. Gupta,Quan Z. Sheng
  • Publisher : CRC Press
  • Release Date : 2019-02-05
  • Total pages : 352
  • ISBN : 9780128029275
GET BOOK

Summary : While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, ...

ADVANCES IN COMPUTING INFORMATICS NETWORKING AND CYBERSECURITY

ADVANCES IN COMPUTING  INFORMATICS  NETWORKING AND CYBERSECURITY
  • Author : P. Nicopolitidis,Sudip Misra,Laurence Tianruo Yang,Bernard P. Zeigler,Zhaolng Ning
  • Publisher : Springer Nature
  • Release Date : 2022
  • Total pages : 212
  • ISBN : 9780128029275
GET BOOK

Summary : This book presents new research contributions in the above-mentioned fields. Information and communication technologies (ICT) have an integral role in todays society. Four major driving pillars in the field are computing, which nowadays enables data processing in unprecedented speeds, informatics, which derives information stemming for processed data to feed relevant ...