posted by user: ramimos || 3693 views || tracked by 3 users: [display]

ICAI 2013 : ICAI 2013 Session title: ​Learning related to MapReduce and Phishing Detection

FacebookTwitterLinkedInGoogle

Link: http://ramimustafaa.wix.com/mapreduced-phihsing
 
When Jul 22, 2013 - Jul 25, 2013
Where Las Vegas, USA.
Submission Deadline Apr 24, 2013
Notification Due May 24, 2013
Final Version Due Jun 1, 2013
Categories    map reduced   phishing   security   huge data processing
 

Call For Papers

ICAI 2013 Session title: ​Learning related to MapReduce and Phishing Detection​


​This session combines between new trends in learning algorithms within data mining and machine learning. The first one is the MapReduce programming paradigm which is becoming popular for large scale data intensive distributed applications due to its efficiency, simplicity and ease of use. The second trend is about web security such as detecting phishing which is simply identifying the type of a website and email based on certain characteristics that are connected with the website/email. Papers related to distributed, parallel, incremental learning algorithms for the different type of data mining tasks (classification, clustering, association rule, etc) are welcome.

Related Resources

BioMAT 2025   European Symposium on Biomaterials and Related Areas
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
DRRIM 2025   Workshop on Data-Related Remedies in Digital Platform Markets
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
Winter 2026   The Hemingway Review To Feel More than You Understand
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
HB 8.2 2025   Humanities Bulletin 8.2, November 2025 Special Issue: Reading to Know, Learning to Hear, Engaging in Respect and Love within an Intercultural Frame
SECRYPT 2025   22nd International Conference on Security and Cryptography
ICPE 2025   16th ACM/SPEC International Conference on Performance Engineering
CANS 2025   Cryptology and Network Security