2015
DOI: 10.1016/c2014-0-03762-8
|View full text |Cite
|
Sign up to set email alerts
|

A Machine-Learning Approach to Phishing Detection and Defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…The test attributes of each current node are selected based on the attribute that has the maximum information. The operation of a DT on a dataset (DS) is expressed in [51] as follows:…”
Section: Decision Tree (Dt)mentioning
confidence: 99%
See 1 more Smart Citation
“…The test attributes of each current node are selected based on the attribute that has the maximum information. The operation of a DT on a dataset (DS) is expressed in [51] as follows:…”
Section: Decision Tree (Dt)mentioning
confidence: 99%
“…, n). The SVM represents DS as points in an N-dimensional space and then tries to develop a hyperplane that will split the space into specific class labels with a right margin of error [51]. Equations (3) and 4shows the formula used in the algorithm for the SVM optimisation.…”
Section: Support Vector Machine (Svm)mentioning
confidence: 99%
“…As the last step of dataset preprocessing, the dataset values are normalized using the standard min-max normalization [12], [13] as illustrated in (1):…”
Section: Methodsmentioning
confidence: 99%
“…The "DT is a flow-chart-like tree structure that uses a branching technique to clarify every single likely result of a decision" (2) . Algorithm 1 explains the operations of the DT algorithm (2,50) . The settings of our DT model was, max_depth = 4 and criterion = entropy.…”
Section: Machine Learning Modelmentioning
confidence: 99%