Library Logo

A machine-learning approach to phishing detection and defense / (Record no. 247027)

000 -LEADER
fixed length control field 02787cam a2200481Ia 4500
001 - CONTROL NUMBER
control field ocn898326414
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190328114809.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 141219t20142015ne o 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency IDEBK
Language of cataloging eng
Description conventions pn
Transcribing agency IDEBK
Modifying agency N$T
-- EBLCP
-- N$T
-- OPELS
-- OCLCF
-- DEBSZ
-- DEBBG
-- OCLCQ
-- MERUC
-- OCLCQ
-- U3W
-- D6H
-- OCLCQ
-- CUY
-- ZCU
-- ICG
-- DKC
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1322480850
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781322480855
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128029466
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0128029463
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780128029275
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)898326414
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773.15.P45
072 #7 - SUBJECT CATEGORY CODE
Subject category code SOC
Subject category code subdivision 004000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.168
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Akanbi, Oluwatobi Ayodeji,
Relator term author.
245 12 - TITLE STATEMENT
Title A machine-learning approach to phishing detection and defense /
Medium [electronic resource]
Statement of responsibility, etc. Oluwatobi Ayodeji Akanbi, Iraj Sadegh Amiri, Elahe Fazeldehkordi.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Amsterdam :
Name of publisher, distributor, etc. Elsevier,
Date of publication, distribution, etc. 2014
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice �2015
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc. Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Phishing.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element SOCIAL SCIENCE
General subdivision Criminology.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
Source of heading or term fast
Authority record control number (OCoLC)fst00872341
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Phishing.
Source of heading or term fast
Authority record control number (OCoLC)fst01737436
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term lcgft
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Amiri, Iraj Sadegh,
Dates associated with a name 1977-
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Fazeldehkordi, Elahe,
Relator term author.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Erscheint auch als:
Note Druck-Ausgabe
Title Amiri, I.S.A Machine-Learning Approach to Phishing Detection and Defense
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified ScienceDirect
Uniform Resource Identifier http://www.sciencedirect.com/science/book/9780128029275

No items available.

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login