Machine Learning for Computer and Cyber Security 2019
DOI: 10.1201/9780429504044-2
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning for Phishing Detection and Mitigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…These activities compromise the integrity, availability, and confidentiality of systems and have a negative impact on the global economy [117,118]. A drastic increase in the amount of cybercrimes has initiated the application of machine learning techniques to provide solutions for early detection and prevention of such cybercrimes [43]. Machine learning techniques offer better results in cases that they are trained on diverse, massive, and real-time datasets.…”
Section: B Com M Only Used Security Datasetsmentioning
confidence: 99%
See 1 more Smart Citation
“…These activities compromise the integrity, availability, and confidentiality of systems and have a negative impact on the global economy [117,118]. A drastic increase in the amount of cybercrimes has initiated the application of machine learning techniques to provide solutions for early detection and prevention of such cybercrimes [43]. Machine learning techniques offer better results in cases that they are trained on diverse, massive, and real-time datasets.…”
Section: B Com M Only Used Security Datasetsmentioning
confidence: 99%
“…ML techniques are playing a vital role in numerous applications of the cyber security for early detection and prediction of different attacks such as spam classification [29][30][31][32], fraud detection [33][34][35][36], malware detection [37][38][39][40], phishing [41][42][43], darkweb or deepweb sites [44,45], and intrusion detection [46][47][48][49]. ML techniques can address the scarcity available of required personnel with expertise in these niche cybercrime detection technologies.…”
Section: Introductionmentioning
confidence: 99%
“…The use of the optimization algorithm to solve real-world problems started in the early of this century [1,2]. A well-known sector of optimization algorithms called metaheuristic algorithms, which were able to solve different types of problems in different domains [3][4][5][6]. The reasons behind the usage of metaheuristic algorithms in different fields, as they were able to find near-optimal solutions with fast search speed, and its flexibility to suit different types of problems [7][8][9] which is very important in our modern life specially in software development [10].…”
Section: Introductionmentioning
confidence: 99%
“…In contrast, it has serious shortcomings such as sensitivity to noise and stuck in local optimum [7], [8]. In order to solve these problems, evolutionary algorithms and variants such as firefly algorithm (FA) [9], [10], particle swarm optimization (PSO) [11], cuckoo search (CS) [12], [13], and artificial bee colony (ABC) [14] and harmony search (HS) [15]- [17] have been successes in many domains such as segmentation of images [1], [2], [8], [18]- [20], clustering [21] and in several fields [22], [23]. In this paper, several studies have been reviewed, which are related to image segmentation methods based clustering approach with evolutionary algorithms, these studies are reviewed as follow, In Alrosan et al [20], proposed fuzzy c-means were combined with ABC algorithms and called ABC-FCM, and this method was carried out by two kinds of MRI images namely the simulated brain MRI images, Alrosan et al [8], [24] presented a novel version of ABC algorithm, namely (Mean WBC) that is merged with the FCM clustering approach.…”
Section: Introductionmentioning
confidence: 99%