August 2019
Intermediate to advanced
342 pages
9h 35m
English
Most security threats use email as an attack vector. Since the amount of traffic conveyed in this way is particularly large, it is necessary to use automated detection procedures that exploit machine learning (ML) algorithms. In this chapter, different detection strategies ranging from linear classifiers and Bayesian filters to more sophisticated solutions such as decision trees, logistic regression, and natural language processing (NLP) will be illustrated.
This chapter will cover the following topics:
Read now
Unlock full access