A Machine-Learning Approach to Phishing Detection and Defense

A Machine-Learning Approach to Phishing Detection and Defense

ISBN-10:
0128029277
ISBN-13:
9780128029275
Pub. Date:
12/10/2014
Publisher:
Elsevier Science
ISBN-10:
0128029277
ISBN-13:
9780128029275
Pub. Date:
12/10/2014
Publisher:
Elsevier Science
A Machine-Learning Approach to Phishing Detection and Defense

A Machine-Learning Approach to Phishing Detection and Defense

$69.95
Current price is , Original price is $69.95. You
$69.95 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.


Overview

Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats.

Product Details

ISBN-13: 9780128029275
Publisher: Elsevier Science
Publication date: 12/10/2014
Pages: 100
Product dimensions: 5.90(w) x 8.80(h) x 0.40(d)

About the Author

O.A. Akanbi received his B. Sc. (Hons, Information Technology – Software Engineering) from Kuala Lumpur Metropolitan University, Malaysia, M. Sc. in Information Security from University Teknologi Malaysia (UTM), and he is presently a graduate student in Computer Science at Texas Tech University His area of research is in CyberSecurity.

Dr. Iraj Sadegh Amiri received his B. Sc (Applied Physics) from Public University of Urmia, Iran in 2001 and a gold medalist M. Sc. in optics from University Technology Malaysia (UTM), in 2009. He was awarded a PhD degree in photonics in Jan 2014. He has published well over 350 academic publications since the 2012s in optical soliton communications, laser physics, photonics, optics and nanotechnology engineering. Currently he is a senior lecturer in University of Malaysia (UM), Kuala Lumpur, Malaysia.

E. Fazeldehkordi received her Associate’s Degree in Computer Hardware from the University of Science and Technology, Tehran, Iran, B. Sc (Electrical Engineering-Electronics) from Azad University of Tafresh, Iran, and M. Sc. in Information Security from Universiti Teknologi Malaysia (UTM). She currently conducts research in information security and has recently published her research on Mobile Ad Hoc Network Security using CreateSpace.

Table of Contents

  1. Introduction
  2. Literature Review
  3. Research Methodology
  4. Feature Extraction
  5. Implementation and Result
  6. Conclusions
From the B&N Reads Blog

Customer Reviews