Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
O.A. Akanbi received his B. Sc. (Hons, Information Technology - Software Engineering) from Kuala Lumpur Metropolitan University, Malaysia, M. Sc. in Information Security from University Teknologi Malaysia (UTM), and he is presently a graduate student in Computer Science at Texas Tech University His area of research is in CyberSecurity.
Dr. Iraj Sadegh Amiri received his B. Sc (Applied Physics) from Public University of Urmia, Iran in 2001 and a gold medalist M. Sc. in optics from University Technology Malaysia (UTM), in 2009. He was awarded a PhD degree in photonics in Jan 2014. He has published well over 350 academic publications since the 2012s in optical soliton communications, laser physics, photonics, optics and nanotechnology engineering. Currently he is a senior lecturer in University of Malaysia (UM), Kuala Lumpur, Malaysia.
E. Fazeldehkordi received her Associate's Degree in Computer Hardware from the University of Science and Technology, Tehran, Iran, B. Sc (Electrical Engineering-Electronics) from Azad University of Tafresh, Iran, and M. Sc. in Information Security from Universiti Teknologi Malaysia (UTM). She currently conducts research in information security and has recently published her research on Mobile Ad Hoc Network Security using CreateSpace.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 100 pages. 8.75x6.00x0.50 inches. In Stock. This item is printed on demand. N° de réf. du vendeur __0128029277
Quantité disponible : 2 disponible(s)
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. pp. 100. N° de réf. du vendeur 356259644
Quantité disponible : 3 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 23068819-n
Quantité disponible : Plus de 20 disponibles
Vendeur : Chiron Media, Wallingford, Royaume-Uni
Paperback. Etat : New. N° de réf. du vendeur 6666-ELS-9780128029275
Quantité disponible : Plus de 20 disponibles
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. pp. 100. N° de réf. du vendeur 26357279971
Quantité disponible : 3 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 23068819
Quantité disponible : Plus de 20 disponibles
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. pp. 100. N° de réf. du vendeur 18357279977
Quantité disponible : 3 disponible(s)
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats. Englisch. N° de réf. du vendeur 9780128029275
Quantité disponible : 2 disponible(s)
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : New. N° de réf. du vendeur 23068819-n
Quantité disponible : Plus de 20 disponibles
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 23068819
Quantité disponible : Plus de 20 disponibles