A Machine Learning Approach to Phishing Detection and Defense Book

A Machine Learning Approach to Phishing Detection and Defense


  • Author : Iraj Sadegh Amiri
  • Publisher : Syngress
  • Release Date : 2014-12-05
  • Genre: Computers
  • Pages : 101
  • ISBN 10 : 9780128029466

DOWNLOAD BOOK
A Machine Learning Approach to Phishing Detection and Defense Excerpt :

Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats. Discover novel research into the uses of machine-learning principles and algorithms to detect and prevent phishing attacks Help your business or organization avoid costly damage from phishing sources Gain insight into machine-learning strategies for facing a variety of information security threats

Handbook of Research on Cyber Approaches to Public Administration and Social Policy Book

Handbook of Research on Cyber Approaches to Public Administration and Social Policy


  • Author : Özsungur, Fahri
  • Publisher : IGI Global
  • Release Date : 2022-06-10
  • Genre: Political Science
  • Pages : 692
  • ISBN 10 : 9781668433812

DOWNLOAD BOOK
Handbook of Research on Cyber Approaches to Public Administration and Social Policy Excerpt :

During the COVID-19 era, the functions of social policy and public administration have undergone a meaningful change, especially with the advancement of digital elements and online and virtual functions. Cyber developments, cyber threats, and the effects of cyberwar on the public administrations of countries have become critical research subjects, and it is important to have resources that can introduce and guide users through the current best practices, laboratory methods, policies, protocols, and more within cyber public administration and social policy. The Handbook of Research on Cyber Approaches to Public Administration and Social Policy focuses on the post-pandemic changes in the functions of social policy and public administration. It also examines the implications of the cyber cosmos on public and social policies and practices from a broad perspective. Covering topics such as intersectional racism, cloud computing applications, and public policies, this major reference work is an essential resource for scientists, laboratory technicians, professionals, technologists, computer scientists, policymakers, students, educators, researchers, and academicians.

Machine Learning in Image Analysis and Pattern Recognition Book

Machine Learning in Image Analysis and Pattern Recognition


  • Author : Munish Kumar
  • Publisher : MDPI
  • Release Date : 2021-09-08
  • Genre: Technology & Engineering
  • Pages : 112
  • ISBN 10 : 9783036517148

DOWNLOAD BOOK
Machine Learning in Image Analysis and Pattern Recognition Excerpt :

This book is to chart the progress in applying machine learning, including deep learning, to a broad range of image analysis and pattern recognition problems and applications. In this book, we have assembled original research articles making unique contributions to the theory, methodology and applications of machine learning in image analysis and pattern recognition.

Artificial Cognitive Architecture with Self Learning and Self Optimization Capabilities Book

Artificial Cognitive Architecture with Self Learning and Self Optimization Capabilities


  • Author : Gerardo Beruvides
  • Publisher : Springer
  • Release Date : 2018-12-14
  • Genre: Technology & Engineering
  • Pages : 195
  • ISBN 10 : 9783030039493

DOWNLOAD BOOK
Artificial Cognitive Architecture with Self Learning and Self Optimization Capabilities Excerpt :

This book introduces three key issues: (i) development of a gradient-free method to enable multi-objective self-optimization; (ii) development of a reinforcement learning strategy to carry out self-learning and finally, (iii) experimental evaluation and validation in two micromachining processes (i.e., micro-milling and micro-drilling). The computational architecture (modular, network and reconfigurable for real-time monitoring and control) takes into account the analysis of different types of sensors, processing strategies and methodologies for extracting behavior patterns from representative process’ signals. The reconfiguration capability and portability of this architecture are supported by two major levels: the cognitive level (core) and the executive level (direct data exchange with the process). At the same time, the architecture includes different operating modes that interact with the process to be monitored and/or controlled. The cognitive level includes three fundamental modes such as modeling, optimization and learning, which are necessary for decision-making (in the form of control signals) and for the real-time experimental characterization of complex processes. In the specific case of the micromachining processes, a series of models based on linear regression, nonlinear regression and artificial intelligence techniques were obtained. On the other hand, the executive level has a constant interaction with the process to be monitored and/or controlled. This level receives the configuration and parameterization from the cognitive level to perform the desired monitoring and control tasks.

Algorithms and Architectures for Parallel Processing  Part II Book

Algorithms and Architectures for Parallel Processing Part II


  • Author : Yang Xiang
  • Publisher : Springer Science & Business Media
  • Release Date : 2011-10-07
  • Genre: Computers
  • Pages : 431
  • ISBN 10 : 9783642246685

DOWNLOAD BOOK
Algorithms and Architectures for Parallel Processing Part II Excerpt :

This two volume set LNCS 7016 and LNCS 7017 constitutes the refereed proceedings of the 11th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2011, held in Melbourne, Australia, in October 2011. The second volume includes 37 papers from one symposium and three workshops held together with ICA3PP 2011 main conference. These are 16 papers from the 2011 International Symposium on Advances of Distributed Computing and Networking (ADCN 2011), 10 papers of the 4th IEEE International Workshop on Internet and Distributed Computing Systems (IDCS 2011), 7 papers belonging to the III International Workshop on Multicore and Multithreaded Architectures and Algorithms (M2A2 2011), as well as 4 papers of the 1st IEEE International Workshop on Parallel Architectures for Bioinformatics Systems (HardBio 2011).

Problems of science and practice  tasks and ways to solve them Book

Problems of science and practice tasks and ways to solve them


  • Author : Anonim
  • Publisher : International Science Group
  • Release Date : 2022-03-22
  • Genre: Language Arts & Disciplines
  • Pages : 428
  • ISBN 10 : 9798885267472

DOWNLOAD BOOK
Problems of science and practice tasks and ways to solve them Excerpt :

Proceedings of the ХI International Scientific and Practical Conference

Computational Collective Intelligence Book

Computational Collective Intelligence


  • Author : Manuel Núñez
  • Publisher : Springer
  • Release Date : 2015-09-09
  • Genre: Computers
  • Pages : 661
  • ISBN 10 : 9783319243061

DOWNLOAD BOOK
Computational Collective Intelligence Excerpt :

This two-volume set (LNAI 9329 and LNAI 9330) constitutes the refereed proceedings of the 7th International Conference on Collective Intelligence, ICCCI 2014, held in Madrid, Spain, in September 2015. The 110 full papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as multi-agent systems; social networks and NLP; sentiment analysis; computational intelligence and games; ontologies and information extraction; formal methods and simulation; neural networks, SMT and MIS; collective intelligence in Web systems – Web systems analysis; computational swarm intelligence; cooperative strategies for decision making and optimization; advanced networking and security technologies; IT in biomedicine; collective computational intelligence in educational context; science intelligence and data analysis; computational intelligence in financial markets; ensemble learning; big data mining and searching.

Integrated Micro Ring Photonics Book
Score: 5
From 1 Ratings

Integrated Micro Ring Photonics


  • Author : Iraj Sadegh Amiri
  • Publisher : CRC Press
  • Release Date : 2016-12-08
  • Genre: Computers
  • Pages : 174
  • ISBN 10 : 9781317404835

DOWNLOAD BOOK
Integrated Micro Ring Photonics Excerpt :

Micro-ring resonators (MRRs) are employed to generate signals used for optical communication applications, where they can be integrated in a single system. These structures are ideal candidates for very large-scale integrated (VLSI) photonic circuits, since they provide a wide range of optical signal processing functions while being ultra-compact. Soliton pulses have sufficient stability for preservation of their shape and velocity. Technological progress in fields such as tunable narrow band laser systems, multiple transmission, and MRR systems constitute a base for the development of new transmission techniques. Controlling the speed of a light signal has many potential applications in fiber optic communication and quantum computing. The slow light effect has many important applications and is a key technology for all optical networks such as optical signal processing. Generation of slow light in MRRs is based on the nonlinear optical fibers. Slow light can be generated within the micro-ring devices, which will be able to be used with the mobile telephone. Therefore, the message can be kept encrypted via quantum cryptography. Thus perfect security in a mobile telephone network is plausible. This research study involves both numerical experiments and theoretical work based on MRRs for secured communication.

Machine Learning for Computer and Cyber Security Book

Machine Learning for Computer and Cyber Security


  • Author : Brij B. Gupta
  • Publisher : CRC Press
  • Release Date : 2019-02-05
  • Genre: Computers
  • Pages : 333
  • ISBN 10 : 9780429995712

DOWNLOAD BOOK
Machine Learning for Computer and Cyber Security Excerpt :

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding

Deep Learning Applications for Cyber Security Book

Deep Learning Applications for Cyber Security


  • Author : Mamoun Alazab
  • Publisher : Springer
  • Release Date : 2019-08-14
  • Genre: Computers
  • Pages : 246
  • ISBN 10 : 9783030130572

DOWNLOAD BOOK
Deep Learning Applications for Cyber Security Excerpt :

Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic identification. This book addresses questions of how deep learning methods can be used to advance cyber security objectives, including detection, modeling, monitoring and analysis of as well as defense against various threats to sensitive data and security systems. Filling an important gap between deep learning and cyber security communities, it discusses topics covering a wide range of modern and practical deep learning techniques, frameworks and development tools to enable readers to engage with the cutting-edge research across various aspects of cyber security. The book focuses on mature and proven techniques, and provides ample examples to help readers grasp the key points.

Developments and Advances in Defense and Security Book

Developments and Advances in Defense and Security


  • Author : Álvaro Rocha
  • Publisher : Springer
  • Release Date : 2019-06-13
  • Genre: Technology & Engineering
  • Pages : 534
  • ISBN 10 : 9789811391552

DOWNLOAD BOOK
Developments and Advances in Defense and Security Excerpt :

This book gathers the proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS), held at the Military Engineering Institute, Rio de Janeiro, Brazil, from 8 to 10th May 2019. It covers a variety of topics in systems, communication and defense; strategy and political-administrative vision in defense; and engineering and technologies applied to defense. Given its scope, it offers a valuable resource for practitioners, researchers, and students alike.

Mobile Malware Attacks and Defense Book
Score: 4
From 1 Ratings

Mobile Malware Attacks and Defense


  • Author : Ken Dunham
  • Publisher : Syngress
  • Release Date : 2008-11-12
  • Genre: Computers
  • Pages : 440
  • ISBN 10 : 0080949193

DOWNLOAD BOOK
Mobile Malware Attacks and Defense Excerpt :

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices. * Visual Payloads View attacks as visible to the end user, including notation of variants. * Timeline of Mobile Hoaxes and Threats Understand the history of major attacks and horizon for emerging threates. * Overview of Mobile Malware Families Identify and understand groups of mobile malicious code and their variations. * Taxonomy of Mobile Malware Bring order to known samples based on infection, distribution, and payload strategies. * Phishing, SMishing, and Vishing Attacks Detect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques. * Operating System and Device Vulnerabilities Analyze unique OS security issues and examine offensive mobile device threats. * Analyze Mobile Malware Design a sandbox for dynamic software analysis and use MobileSandbox to analyze mobile malware. * Forensic Analysis of Mobile Malware Conduct forensic analysis of mobile devices and learn key differences in mobile forensics. * Debugging and Disassembling Mobile Malware Use IDA and other tools to reverse-engineer samples of malicious code for analysis. * Mobile Malware Mitigation Measures Qualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents. * Understand the History and Threat Landscape of Rapidly Emerging Mobile Attacks * Analyze Mobile Device/Platform Vulnerabilities and Exploits * Mitigate Current and Future Mobile Malware Threats

Computational Science and Technology Book

Computational Science and Technology


  • Author : Rayner Alfred
  • Publisher : Springer Nature
  • Release Date : 2019-08-29
  • Genre: Technology & Engineering
  • Pages : 734
  • ISBN 10 : 9789811500589

DOWNLOAD BOOK
Computational Science and Technology Excerpt :

This book gathers the proceedings of the Sixth International Conference on Computational Science and Technology 2019 (ICCST2019), held in Kota Kinabalu, Malaysia, on 29–30 August 2019. The respective contributions offer practitioners and researchers a range of new computational techniques and solutions, identify emerging issues, and outline future research directions, while also showing them how to apply the latest large-scale, high-performance computational methods.

Advanced Practical Approaches to Web Mining Techniques and Application Book

Advanced Practical Approaches to Web Mining Techniques and Application


  • Author : Obaid, Ahmed J.
  • Publisher : IGI Global
  • Release Date : 2022-03-18
  • Genre: Computers
  • Pages : 357
  • ISBN 10 : 9781799894285

DOWNLOAD BOOK
Advanced Practical Approaches to Web Mining Techniques and Application Excerpt :

The rapid increase of web pages has introduced new challenges for many organizations as they attempt to extract information from a massive corpus of web pages. Finding relevant information, eliminating irregular content, and retrieving accurate results has become extremely difficult in today’s world where there is a surplus of information available. It is crucial to further understand and study web mining in order to discover the best ways to connect users with appropriate information in a timely manner. Advanced Practical Approaches to Web Mining Techniques and Application aims to illustrate all the concepts of web mining and fosters transformative, multidisciplinary, and novel approaches that introduce the practical method of analyzing various web data sources and extracting knowledge by taking into consideration the unique challenges present in the environment. Covering a range of topics such as data science and security threats, this reference work is ideal for industry professionals, researchers, academicians, practitioners, scholars, instructors, and students.

Computer Security    ESORICS 2012 Book

Computer Security ESORICS 2012


  • Author : Sara Foresti
  • Publisher : Springer
  • Release Date : 2012-08-19
  • Genre: Computers
  • Pages : 896
  • ISBN 10 : 9783642331671

DOWNLOAD BOOK
Computer Security ESORICS 2012 Excerpt :

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.