Syndetics cover image
Image from Syndetics

A machine-learning approach to phishing detection and defense / Oluwatobi Ayodeji Akanbi, Iraj Sadegh Amiri, Elahe Fazeldehkordi.

By: Contributor(s): Material type: TextTextPublisher: Waltham, Massachusetts : Syngress, 2015Copyright date: ©2015Description: 1 online resource (101 pages) : illustrations, tablesContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780128029466 (e-book)
Subject(s): Genre/Form: Additional physical formats: Print version:: Machine-learning approach to phishing detection and defense.DDC classification:
  • 364.1633 23
LOC classification:
  • HV6773 .O433 2015
Online resources:
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Ebrary Online Books Ebrary Online Books Colombo Available CBERA1000572
Ebrary Online Books Ebrary Online Books Jaffna Available JFEBRA1000572
Ebrary Online Books Ebrary Online Books Kandy Available KDEBRA1000572
Total holds: 0

Enhanced descriptions from Syndetics:

Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats.- Discover novel research into the uses of machine-learning principles and algorithms to detect and prevent phishing attacks- Help your business or organization avoid costly damage from phishing sources- Gain insight into machine-learning strategies for facing a variety of information security threats

Includes bibliographical references.

Description based on online resource; title from PDF title page (ebrary, viewed January 09, 2015).

Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.

There are no comments on this title.

to post a comment.