Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats.
"synopsis" may belong to another edition of this title.
O.A. Akanbi received his B. Sc. (Hons, Information Technology - Software Engineering) from Kuala Lumpur Metropolitan University, Malaysia, M. Sc. in Information Security from University Teknologi Malaysia (UTM), and he is presently a graduate student in Computer Science at Texas Tech University His area of research is in CyberSecurity.
Dr. Iraj Sadegh Amiri received his B. Sc (Applied Physics) from Public University of Urmia, Iran in 2001 and a gold medalist M. Sc. in optics from University Technology Malaysia (UTM), in 2009. He was awarded a PhD degree in photonics in Jan 2014. He has published well over 350 academic publications since the 2012s in optical soliton communications, laser physics, photonics, optics and nanotechnology engineering. Currently he is a senior lecturer in University of Malaysia (UM), Kuala Lumpur, Malaysia.
E. Fazeldehkordi received her Associate’s Degree in Computer Hardware from the University of Science and Technology, Tehran, Iran, B. Sc (Electrical Engineering-Electronics) from Azad University of Tafresh, Iran, and M. Sc. in Information Security from Universiti Teknologi Malaysia (UTM). She currently conducts research in information security and has recently published her research on Mobile Ad Hoc Network Security using CreateSpace.
"About this title" may belong to another edition of this title.
Shipping:
US$ 2.64
Within U.S.A.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 23068819-n
Quantity: Over 20 available
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 100 pages. 8.75x6.00x0.50 inches. In Stock. This item is printed on demand. Seller Inventory # __0128029277
Quantity: 2 available
Seller: Chiron Media, Wallingford, United Kingdom
Paperback. Condition: New. Seller Inventory # 6666-ELS-9780128029275
Quantity: Over 20 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 100. Seller Inventory # 26357279971
Quantity: 3 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. pp. 100. Seller Inventory # 356259644
Quantity: 3 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 23068819
Quantity: Over 20 available
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats. Englisch. Seller Inventory # 9780128029275
Quantity: 2 available
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. pp. 100. Seller Inventory # 18357279977
Quantity: 3 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9780128029275_new
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 23068819-n
Quantity: Over 20 available