Halder et al., 2018 - Google Patents
Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystemHalder et al., 2018
- Document ID
- 10011688593266619914
- Author
- Halder S
- Ozdemir S
- Publication year
External Links
Snippet
Get into the world of smart data security using machine learning algorithms and Python libraries Key FeaturesLearn machine learning algorithms and cybersecurity fundamentalsAutomate your daily workflow by applying use cases to many facets of …
- 238000010801 machine learning 0 title abstract description 179
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rao et al. | Detection of phishing websites using an efficient feature-based machine learning framework | |
Tang et al. | A survey of machine learning-based solutions for phishing website detection | |
Chio et al. | Machine learning and security: Protecting systems with data and algorithms | |
Parisi | Hands-On Artificial Intelligence for Cybersecurity: Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies | |
Talabis et al. | Information security analytics: finding security insights, patterns, and anomalies in big data | |
Halder et al. | Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem | |
Mourtaji et al. | Hybrid Rule‐Based Solution for Phishing URL Detection Using Convolutional Neural Network | |
Sánchez-Paniagua et al. | Phishing websites detection using a novel multipurpose dataset and web technologies features | |
Alzahrani et al. | AI-based techniques for Ad click fraud detection and prevention: Review and research directions | |
Chebbi | Mastering machine learning for penetration testing: develop an extensive skill set to break self-learning systems using Python | |
Taofeek | Development of a Novel Approach to Phishing Detection Using Machine Learning | |
Pillai et al. | Hybrid unsupervised web-attack detection and classification–A deep learning approach | |
Okpor et al. | Pilot Study on Enhanced Detection of Cues over Malicious Sites Using Data Balancing on the Random Forest Ensemble | |
Kocyigit et al. | Real-time content-based cyber threat detection with machine learning | |
Mumu et al. | Malicious URL detection using machine learning and deep learning algorithms | |
Ji et al. | Feature driven learning framework for cybersecurity event detection | |
Medelbekov et al. | Machine Learning Methods for Phishing Attacks: Survey | |
Sattari et al. | Intelligent Methods in Phishing Website Detection: A Systematic Literature Review | |
Giovagnini | Interpretable Machine Learning for malware characterization and identification | |
Kulkarni et al. | Phishing Webpage Detection: Unveiling the Threat Landscape and Investigating Detection Techniques | |
Medelbekov et al. | MACHINE LEARNING METHODS FOR PHISHING ATTACKS | |
Brandqvist et al. | Phishing detection challenges for private and organizational users: A comparative study | |
Tang | Design and development of a machine learning-based framework for phishing website detection | |
Eyk | Fighting Phishing at the Website Host | |
Ma | Exploring Phishing Detection Using Search Engine Optimization and Uniform Resource Locator based Information |