• Home
  • A Machine Learning Approach to Phishing Detection and Defense

A Machine Learning Approach to Phishing Detection and Defense

A Machine Learning Approach to Phishing Detection and Defense
  • Author : Iraj Sadegh Amiri
  • Publsiher : Syngress
  • Release : 05 December 2014
  • ISBN : 0128029463
  • Pages : 100 pages
  • Rating : 4/5 from 21 ratings
GET THIS BOOKA Machine Learning Approach to Phishing Detection and Defense

Summary:
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats. Discover novel research into the uses of machine-learning principles and algorithms to detect and prevent phishing attacks Help your business or organization avoid costly damage from phishing sources Gain insight into machine-learning strategies for facing a variety of information security threats


A Machine-Learning Approach to Phishing Detection and Defense

A Machine-Learning Approach to Phishing Detection and Defense
  • Author : Iraj Sadegh Amiri,O.A. Akanbi,E. Fazeldehkordi
  • Publisher : Syngress
  • Release : 05 December 2014
GET THIS BOOKA Machine-Learning Approach to Phishing Detection and Defense

Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats.


Implications of Artificial Intelligence for Cybersecurity

Implications of Artificial Intelligence for Cybersecurity
  • Author : National Academies of Sciences, Engineering, and Medicine,Division on Engineering and Physical Sciences,Intelligence Community Studies Board,Computer Science and Telecommunications Board
  • Publisher : National Academies Press
  • Release : 27 January 2020
GET THIS BOOKImplications of Artificial Intelligence for Cybersecurity

In recent years, interest and progress in the area of artificial intelligence (AI) and machine learning (ML) have boomed, with new applications vigorously pursued across many sectors. At the same time, the computing and communications technologies on which we have come to rely present serious security concerns: cyberattacks have escalated in number, frequency, and impact, drawing increased attention to the vulnerabilities of cyber systems and the need to increase their security. In the face of this changing landscape, there is


Algorithms and Architectures for Parallel Processing, Part II

Algorithms and Architectures for Parallel Processing, Part II
  • Author : Yang Xiang,Alfredo Cuzzocrea,Michael Hobbs,Wanlei Zhou
  • Publisher : Springer Science & Business Media
  • Release : 07 October 2011
GET THIS BOOKAlgorithms and Architectures for Parallel Processing, Part II

This two volume set LNCS 7016 and LNCS 7017 constitutes the refereed proceedings of the 11th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2011, held in Melbourne, Australia, in October 2011. The second volume includes 37 papers from one symposium and three workshops held together with ICA3PP 2011 main conference. These are 16 papers from the 2011 International Symposium on Advances of Distributed Computing and Networking (ADCN 2011), 10 papers of the 4th IEEE International Workshop on Internet and Distributed Computing Systems (IDCS 2011), 7 papers belonging


Machine Learning and Security

Machine Learning and Security
  • Author : Clarence Chio,David Freeman
  • Publisher : "O'Reilly Media, Inc."
  • Release : 26 January 2018
GET THIS BOOKMachine Learning and Security

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself! With this practical guide, you’ll explore ways to apply machine learning to security issues such as intrusion detection, malware classification, and network analysis. Machine learning and security specialists Clarence Chio and David Freeman provide a framework for discussing



Data and Applications Security and Privacy XXXIII

Data and Applications Security and Privacy XXXIII
  • Author : Simon N. Foley
  • Publisher : Springer
  • Release : 02 August 2019
GET THIS BOOKData and Applications Security and Privacy XXXIII

This book constitutes the refereed proceedings of the 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2019, held in Charleston, SC, USA, in July 2018. The 21 full papers presented were carefully reviewed and selected from 52 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on attacks, mobile and Web security, privacy, security protocol practices, distributed systems, source code security, and


Computational Science and Technology

Computational Science and Technology
  • Author : Rayner Alfred,Yuto Lim,Haviluddin Haviluddin,Chin Kim On
  • Publisher : Springer Nature
  • Release : 29 August 2019
GET THIS BOOKComputational Science and Technology

This book gathers the proceedings of the Sixth International Conference on Computational Science and Technology 2019 (ICCST2019), held in Kota Kinabalu, Malaysia, on 29–30 August 2019. The respective contributions offer practitioners and researchers a range of new computational techniques and solutions, identify emerging issues, and outline future research directions, while also showing them how to apply the latest large-scale, high-performance computational methods.


Machine Learning for Computer and Cyber Security

Machine Learning for Computer and Cyber Security
  • Author : Brij B. Gupta,Quan Z. Sheng
  • Publisher : CRC Press
  • Release : 05 February 2019
GET THIS BOOKMachine Learning for Computer and Cyber Security

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information.


Case-Based Reasoning

Case-Based Reasoning
  • Author : Michael M. Richter,Rosina O. Weber
  • Publisher : Springer Science & Business Media
  • Release : 31 October 2013
GET THIS BOOKCase-Based Reasoning

This book presents case-based reasoning in a systematic approach with two goals: to present rigorous and formally valid structures for precise case-based reasoning, and to demonstrate the range of techniques, methods, and tools available for many applications.


Computer Security -- ESORICS 2012

Computer Security -- ESORICS 2012
  • Author : Sara Foresti,Moti Yung,Fabio Martinelli
  • Publisher : Springer
  • Release : 19 August 2012
GET THIS BOOKComputer Security -- ESORICS 2012

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication;


Foundations and Practice of Security

Foundations and Practice of Security
  • Author : Joaquin Garcia-Alfaro,Pascal Lafourcade
  • Publisher : Springer
  • Release : 18 January 2012
GET THIS BOOKFoundations and Practice of Security

This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography; encryption, cryptanalysis and automatic verification; and formal methods in network security.


Advances in Information Retrieval

Advances in Information Retrieval
  • Author : Mohand Boughanem,Catherine Berrut,Josiane Mothe,Chantal Soule-Dupuy
  • Publisher : Springer Science & Business Media
  • Release : 27 March 2009
GET THIS BOOKAdvances in Information Retrieval

This book constitutes the refereed proceedings of the 30th annual European Conference on Information Retrieval Research, ECIR 2009, held in Toulouse, France in April 2009. The 42 revised full papers and 18 revised short papers presented together with the abstracts of 3 invited lectures and 25 poster papers were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections on retrieval model, collaborative IR / filtering, learning, multimedia - metadata, expert search - advertising, evaluation, opinion detection, web IR, representation, clustering / categorization as well


Detection of Intrusions and Malware, and Vulnerability Assessment

Detection of Intrusions and Malware, and Vulnerability Assessment
  • Author : Bernhard Hämmerli,Robin Sommer
  • Publisher : Springer
  • Release : 14 September 2007
GET THIS BOOKDetection of Intrusions and Malware, and Vulnerability Assessment

This book constitutes the refereed proceedings of the 4th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2007, held in Lucerne, Switzerland in July 2007. The 14 revised full papers presented were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on Web security, intrusion detection, traffic analysis, network security, and host security.


The Nature of Statistical Learning Theory

The Nature of Statistical Learning Theory
  • Author : Vladimir N. Vapnik
  • Publisher : Springer Science & Business Media
  • Release : 17 April 2013
GET THIS BOOKThe Nature of Statistical Learning Theory

The aim of this book is to discuss the fundamental ideas which lie behind the statistical theory of learning and generalization. It considers learning from the general point of view of function estimation based on empirical data. Omitting proofs and technical details, the author concentrates on discussing the main results of learning theory and their connections to fundamental problems in statistics. These include: - the general setting of learning problems and the general model of minimizing the risk functional from


Developments and Advances in Defense and Security

Developments and Advances in Defense and Security
  • Author : Álvaro Rocha,Robson Pacheco Pereira
  • Publisher : Springer
  • Release : 13 June 2019
GET THIS BOOKDevelopments and Advances in Defense and Security

This book gathers the proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS), held at the Military Engineering Institute, Rio de Janeiro, Brazil, from 8 to 10th May 2019. It covers a variety of topics in systems, communication and defense; strategy and political-administrative vision in defense; and engineering and technologies applied to defense. Given its scope, it offers a valuable resource for practitioners, researchers, and students alike.