Social engineering exploitation detection (SEED) in Malaysia's SMEs using machine learning
Over the past years, computer security has been a field of study that assists in protecting one’s information. It has matured over time in fighting against cybercrime in exploiting the technical vulnerabilities of hardware or software. However, there is a kind of attack that particularly exploits th...
Saved in:
Main Author: | Sia, Ken Yen |
---|---|
Format: | Final Year Project / Dissertation / Thesis |
Published: |
2022
|
Subjects: | |
Online Access: | http://eprints.utar.edu.my/4664/1/fyp_CS_2022_SKY.pdf http://eprints.utar.edu.my/4664/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Cyberbullying detection: a machine learning approach
by: Yeong, Su Yen
Published: (2022) -
Impact of exploitative learning strategy on Malaysian SMEs creativity and innovation capabilities
by: Valaei, N., et al.
Published: (2016) -
Novel Multi-swarm Approach for Balancing Exploration and Exploitation in Particle Swarm Optimization
by: Salih, Sinan Q., et al.
Published: (2019) -
Open innovation adoption: the role of technology exploration, technology exploitation and trust among SMEs and helices in triple helix model
by: Siti Noratisah, Mohd Nafi
Published: (2017) -
Neuro-Physiological porn addiction detection using machine learning approach
by: Kamaruddin, Norhaslinda, et al.
Published: (2019)