Phishing detection using content-based image classification. (2022)
- Record Type:
- Book
- Title:
- Phishing detection using content-based image classification. (2022)
- Main Title:
- Phishing detection using content-based image classification
- Further Information:
- Note: Shekhar Khandelwal, Rik Das.
- Authors:
- Khandelwal, Shekhar
Das, Rik, 1978- - Contents:
- Chapter 1. Phishing and Cybersecurity . Basics of Phishing in Cybersecurity. Phishing Detection Techniques. List (whitelist/blacklist) based. Heuristics (pre-defined rules) based. Visual similarity based. Race between Phishers and Anti-Phishers. Chapter 2. Image Processing based Phishing Detection Techniques . Image processing based phishing detection techniques. Challenges in Phishing Detection using website images. Comparison of Techniques. Summary of Phishing detection using image processing techniques. Chapter 3. Implementing CNN for classifying phishing websites . Data Selection and Pre-Processing. Classification using CNN. CNN implementation. Performance metrics. Building a Convolutional Neural Network Model. Chapter 4. Transfer Learning Approach in Phishing Detection . Classification using Transfer Learning. Transfer Learning python implementation. Performance assessment of CNN models. Chapter 5. Feature Extraction and Representation Learning . Classification using Representation Learning. Data Preparation.. Feature Extraction using CNN off-the-shelf architectures. Handling class imbalance using SMOTE. SMOTE python implementation. Machine learning Classifier. Performance assessment of various experimentations. Chapter 6. Dimensionality Reduction Techniques . Basics of dimensionality reduction. PCA implementation using python. Performance assessment of various experimentations. Chapter 7. Feature Fusion Techniques . Basics of feature fusion technique. DifferentChapter 1. Phishing and Cybersecurity . Basics of Phishing in Cybersecurity. Phishing Detection Techniques. List (whitelist/blacklist) based. Heuristics (pre-defined rules) based. Visual similarity based. Race between Phishers and Anti-Phishers. Chapter 2. Image Processing based Phishing Detection Techniques . Image processing based phishing detection techniques. Challenges in Phishing Detection using website images. Comparison of Techniques. Summary of Phishing detection using image processing techniques. Chapter 3. Implementing CNN for classifying phishing websites . Data Selection and Pre-Processing. Classification using CNN. CNN implementation. Performance metrics. Building a Convolutional Neural Network Model. Chapter 4. Transfer Learning Approach in Phishing Detection . Classification using Transfer Learning. Transfer Learning python implementation. Performance assessment of CNN models. Chapter 5. Feature Extraction and Representation Learning . Classification using Representation Learning. Data Preparation.. Feature Extraction using CNN off-the-shelf architectures. Handling class imbalance using SMOTE. SMOTE python implementation. Machine learning Classifier. Performance assessment of various experimentations. Chapter 6. Dimensionality Reduction Techniques . Basics of dimensionality reduction. PCA implementation using python. Performance assessment of various experimentations. Chapter 7. Feature Fusion Techniques . Basics of feature fusion technique. Different combinations of image representations. Different feature fusion approaches. Performance assessment of various experimentations. Chapter 8. Comparison of Phishing detection approaches . Classification Approaches. Evaluation of Classification Experiments. Comparison of the best performing model with the State-of-the-art. Chapter 9. Basics of Digital Image Processing . Basics of digital image processing. Basics of extracting features using OpenCV. … (more)
- Edition:
- 1st
- Publisher Details:
- Boca Raton : Chapman & Hall/CRC
- Publication Date:
- 2022
- Extent:
- 1 online resource, illustrations (black and white)
- Subjects:
- 005.82
Computer security
Phishing -- Prevention
Optical pattern recognition
Images, Photographic -- Classification - Languages:
- English
- ISBNs:
- 9781000597691
9781000597684
9781003217381 - Related ISBNs:
- 9781032108537
- Notes:
- Note: Description based on CIP data; resource not viewed.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.694823
- Ingest File:
- 12_025.xml