A machine-learning approach to phishing detection and defense / (Record no. 247027)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02787cam a2200481Ia 4500 |
001 - CONTROL NUMBER | |
control field | ocn898326414 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20190328114809.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr |n||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 141219t20142015ne o 000 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | IDEBK |
Language of cataloging | eng |
Description conventions | pn |
Transcribing agency | IDEBK |
Modifying agency | N$T |
-- | EBLCP |
-- | N$T |
-- | OPELS |
-- | OCLCF |
-- | DEBSZ |
-- | DEBBG |
-- | OCLCQ |
-- | MERUC |
-- | OCLCQ |
-- | U3W |
-- | D6H |
-- | OCLCQ |
-- | CUY |
-- | ZCU |
-- | ICG |
-- | DKC |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1322480850 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781322480855 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780128029466 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0128029463 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9780128029275 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)898326414 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV6773.15.P45 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | SOC |
Subject category code subdivision | 004000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 364.168 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Akanbi, Oluwatobi Ayodeji, |
Relator term | author. |
245 12 - TITLE STATEMENT | |
Title | A machine-learning approach to phishing detection and defense / |
Medium | [electronic resource] |
Statement of responsibility, etc. | Oluwatobi Ayodeji Akanbi, Iraj Sadegh Amiri, Elahe Fazeldehkordi. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | Amsterdam : |
Name of publisher, distributor, etc. | Elsevier, |
Date of publication, distribution, etc. | 2014 |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | �2015 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Phishing. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | SOCIAL SCIENCE |
General subdivision | Criminology. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst00872341 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Phishing. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst01737436 |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
655 #7 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
Source of term | lcgft |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Amiri, Iraj Sadegh, |
Dates associated with a name | 1977- |
Relator term | author. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Fazeldehkordi, Elahe, |
Relator term | author. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Erscheint auch als: |
Note | Druck-Ausgabe |
Title | Amiri, I.S.A Machine-Learning Approach to Phishing Detection and Defense |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | ScienceDirect |
Uniform Resource Identifier | http://www.sciencedirect.com/science/book/9780128029275 |
No items available.