Machine learning models are often dismissed on the grounds of lack of interpretability. There is a popular story about modern algorithms that goes as follows:
One of the newest techniques to detect anomalies is called Isolation Forests. The algorithm is based on the fact that anomalies are data points that
The Technical Side of Phishing and How to Prevent It Phishing, by definition, is the act of defrauding an online user and tricking them into
Phishing Attack Analysis: Estimating Key Cluster Features and Why It’s Important First, let’s quickly review the clusters we built to understand phishing attacks. Using data
Fraud Detection That Accounts for Misclassification Using Cost-Sensitive Logistic Regression Fraud detection is a cost-sensitive problem, in the sense that falsely flagging a transaction as
Clustering of Phishing Attacks In a recent report we showed how we are able to gain better understanding of phishing attacks and attackers by using cluster analysis.