Social engineering exploitation detection (SEED) in Malaysia's SMEs using machine learning
Over the past years, computer security has been a field of study that assists in protecting one’s information. It has matured over time in fighting against cybercrime in exploiting the technical vulnerabilities of hardware or software. However, there is a kind of attack that particularly exploits th...
| Main Author: | Sia, Ken Yen |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2022
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/4664/ http://eprints.utar.edu.my/4664/1/fyp_CS_2022_SKY.pdf |
Similar Items
Cyberbullying detection: a machine learning approach
by: Yeong, Su Yen
Published: (2022)
by: Yeong, Su Yen
Published: (2022)
Deep learning enabled fall detection exploiting gait analysis
by: Anwary, Arif Reza, et al.
Published: (2022)
by: Anwary, Arif Reza, et al.
Published: (2022)
The diversity and exploitation of sea cucumbers in Malaysia and its neighboring countries
by: Kamarudin, Kamarul Rahim
Published: (2010)
by: Kamarudin, Kamarul Rahim
Published: (2010)
Cancer recurrence prediction using machine learning
by: Shoon Lei, Win, et al.
Published: (2014)
by: Shoon Lei, Win, et al.
Published: (2014)
On the exploration and exploitation in popular swarm-based
metaheuristic algorithms
by: Hussain, Kashif, et al.
Published: (2018)
by: Hussain, Kashif, et al.
Published: (2018)
Machine Learning for Fake News Detection Analysis
by: S., Abhilasha, et al.
Published: (2024)
by: S., Abhilasha, et al.
Published: (2024)
Agarwood Oil Quality Classifier Using Machine Learning
by: M. A., Abas, et al.
Published: (2017)
by: M. A., Abas, et al.
Published: (2017)
Intruder detection in camera networks using the one-class neighbor machine
by: Ahmed, Tarem Ozair, et al.
Published: (2011)
by: Ahmed, Tarem Ozair, et al.
Published: (2011)
An automated pipeline for constructing 3D models of monogenean hardparts using machine learning technique for landmarks detection / Teo Bee Guan
by: Teo , Bee Guan
Published: (2019)
by: Teo , Bee Guan
Published: (2019)
Vision based entomology – how to effectively exploit color and shape features
by: Hassan, Siti Noorul Asiah, et al.
Published: (2014)
by: Hassan, Siti Noorul Asiah, et al.
Published: (2014)
Enhancing Bipolar Disorder Detection Using Heterogeneous Ensemble
Machine Learning Techniques
by: Lingeswari, Sivagnanam, et al.
Published: (2025)
by: Lingeswari, Sivagnanam, et al.
Published: (2025)
Generic Taxonomy of Social Engineering Attack
by: Mohd Foozy, F, et al.
Published: (2011)
by: Mohd Foozy, F, et al.
Published: (2011)
Android mobile malware detection model based on permission features using machine learning approach
by: Sharfah Ratibah, Tuan Mat
Published: (2022)
by: Sharfah Ratibah, Tuan Mat
Published: (2022)
Machine Learning Based Detection for Compromised Accounts on Social Media Networks
by: K., Swapna, et al.
Published: (2025)
by: K., Swapna, et al.
Published: (2025)
COVID-19 fake news detection model on social media data using machine learning techniques
by: Kai Xuan, Kelvin Liew, et al.
Published: (2023)
by: Kai Xuan, Kelvin Liew, et al.
Published: (2023)
Novel Multi-swarm Approach for Balancing Exploration and Exploitation in Particle Swarm Optimization
by: Salih, Sinan Q., et al.
Published: (2019)
by: Salih, Sinan Q., et al.
Published: (2019)
RPC/DCOM exploits detection and notification
by: Halim, Ayub
Published: (2005)
by: Halim, Ayub
Published: (2005)
Phishing Website Detection using Machine Learning
by: Padmini, Y, et al.
Published: (2024)
by: Padmini, Y, et al.
Published: (2024)
Detection of robbery-related concepts using deep learning
by: Vivaaindrean, Ng Shamir Ng
Published: (2020)
by: Vivaaindrean, Ng Shamir Ng
Published: (2020)
Intrusion detection system (IDS) using machine learning
by: Tan, May May
Published: (2024)
by: Tan, May May
Published: (2024)
An Evaluation of Machine Learning Algorithms for Missing Values Imputation
by: Kohbalan, Moorthy, et al.
Published: (2019)
by: Kohbalan, Moorthy, et al.
Published: (2019)
A machine learning framework for automated text categorization
by: Bong, Chih How
Published: (2001)
by: Bong, Chih How
Published: (2001)
Detection of SQL injection attack using machine learning
by: Tung, Tean Thong
Published: (2024)
by: Tung, Tean Thong
Published: (2024)
What is the solution to overcome the financial challenges of SMEs in Indonesia? Exploiting the potential of crowfunding in changing SMEs' financial landscape in Indonesia
by: Mohd Thas Thaker, Mohamed Asmy, et al.
Published: (2015)
by: Mohd Thas Thaker, Mohamed Asmy, et al.
Published: (2015)
A Leak Localisation System In Water Distributed Network Using Machine Learning
by: Png, Wen Hao
Published: (2022)
by: Png, Wen Hao
Published: (2022)
A review on machine learning techniques used for students’ performance prediction
by: N.H., Abdul Rahman, et al.
Published: (2022)
by: N.H., Abdul Rahman, et al.
Published: (2022)
Predictive Modelling of Stroke Occurrence among Patients using Machine Learning
by: Sures, Narayasamy, et al.
Published: (2023)
by: Sures, Narayasamy, et al.
Published: (2023)
Machine learning cases in clinical and biomedical domains
by: Che Azemin, Mohd Zulfaezal, et al.
Published: (2018)
by: Che Azemin, Mohd Zulfaezal, et al.
Published: (2018)
Machine learning classifiers: Evaluation of the performance in online reviews
by: Pak, Irina *, et al.
Published: (2016)
by: Pak, Irina *, et al.
Published: (2016)
Modelling, Detection And Exploitation Of Lexical Functions For Analysis.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
Neuro-physiological porn addiction detection using machine learning approach
by: Kamaruddin, Norhaslinda, et al.
Published: (2019)
by: Kamaruddin, Norhaslinda, et al.
Published: (2019)
Productivity improvement using industrial engineering tools (SMEs company)
by: Shafie, Sulaiman
Published: (2013)
by: Shafie, Sulaiman
Published: (2013)
Engineering of osteogenic construct using rat bone marrow stromal-derived osteoblasts seeded on poly(caprolactone-trifumarate)scaffold / Chai Yoke Chin
by: Chai, Yoke Chin
Published: (2006)
by: Chai, Yoke Chin
Published: (2006)
Exploiting pyrolysis protocols on BTDA‐TDI/MDI (P84) polyimide/nanocrystalline cellulose carbon membrane for gas separations
by: Norazlianie, Sazali, et al.
Published: (2019)
by: Norazlianie, Sazali, et al.
Published: (2019)
Malware Detection In Android Using Machine Learning
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
Identifying PTSD symptoms using machine learning techniques on social media
by: Muhamad Aiman, Ibrahim, et al.
Published: (2023)
by: Muhamad Aiman, Ibrahim, et al.
Published: (2023)
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
by: Mohammad Khamees Khaleel, Alsajri
Published: (2022)
by: Mohammad Khamees Khaleel, Alsajri
Published: (2022)
An improved algorithm for iris classification by using support vector machine and binary random machine learning
by: Kamarulzalis, Ahmad Haadzal
Published: (2018)
by: Kamarulzalis, Ahmad Haadzal
Published: (2018)
UAV-based weed detection in Chinese cabbage using deep learning
by: Pauline Ong, Pauline Ong, et al.
Published: (2023)
by: Pauline Ong, Pauline Ong, et al.
Published: (2023)
UAV-based weed detection in Chinese cabbage using deep learning
by: Pauline Ong, Pauline Ong, et al.
Published: (2023)
by: Pauline Ong, Pauline Ong, et al.
Published: (2023)
Similar Items
-
Cyberbullying detection: a machine learning approach
by: Yeong, Su Yen
Published: (2022) -
Deep learning enabled fall detection exploiting gait analysis
by: Anwary, Arif Reza, et al.
Published: (2022) -
The diversity and exploitation of sea cucumbers in Malaysia and its neighboring countries
by: Kamarudin, Kamarul Rahim
Published: (2010) -
Cancer recurrence prediction using machine learning
by: Shoon Lei, Win, et al.
Published: (2014) -
On the exploration and exploitation in popular swarm-based
metaheuristic algorithms
by: Hussain, Kashif, et al.
Published: (2018)