One of the newest techniques to detect anomalies is called Isolation Forests. The algorithm is based on the fact that anomalies are data points that
The Technical Side of Phishing and How to Prevent It Phishing, by definition, is the act of defrauding an online user and tricking them into
Applying Data Science to Fraud Prevention Eighty thousand Kindle users. Sixty-five million Tumblr users. What do they have in common? Both groups had their login
Phishing Attack Analysis: Estimating Key Cluster Features and Why It’s Important First, let’s quickly review the clusters we built to understand phishing attacks. Using data
Fraud Detection That Accounts for Misclassification Using Cost-Sensitive Logistic Regression Fraud detection is a cost-sensitive problem, in the sense that falsely flagging a transaction as
Clustering of Phishing Attacks In a recent report we showed how we are able to gain better understanding of phishing attacks and attackers by using cluster analysis.