2020
DOI: 10.1007/s12046-020-01392-4
|View full text |Cite
|
Sign up to set email alerts
|

Efficient deep learning techniques for the detection of phishing websites

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 73 publications
(40 citation statements)
references
References 36 publications
0
40
0
Order By: Relevance
“…To create a mixed classification model, CNN and LSTM algorithms were used. [ 61 ] proposed a deep learning model to determine the legitimacy of a website. URL heuristics and third-party service-based features were used to train deep learning models.…”
Section: Related Workmentioning
confidence: 99%
“…To create a mixed classification model, CNN and LSTM algorithms were used. [ 61 ] proposed a deep learning model to determine the legitimacy of a website. URL heuristics and third-party service-based features were used to train deep learning models.…”
Section: Related Workmentioning
confidence: 99%
“…Similar to DNN and CNN, LSTM can be implemented individually [20,[41][42][43][44][45], incorporated with traditional machine learning techniques [46,47], or combined with other DL algorithms in a hybrid model for an improved performance in detecting malicious websites [10,11,31,33,35,36]. Among the studies of LSTM-based phishing detection models, a majority of them specified the parameter settings for neural network architecture, number of epochs, and learning rate; but ignored the dropout rate and batch size [31,41,42,44,47]. Moreover, only certain parameters were optimized during the fine-tuning process [32,42].…”
Section: Long Short-term Memory (Lstm)mentioning
confidence: 99%
“…Among the studies of LSTM-based phishing detection models, a majority of them specified the parameter settings for neural network architecture, number of epochs, and learning rate; but ignored the dropout rate and batch size [31,41,42,44,47]. Moreover, only certain parameters were optimized during the fine-tuning process [32,42]. To evaluate the overall performance of LSTM models, four popular metrics were used, being accuracy, precision, recall, and F1-score [31,35,41,44,45].…”
Section: Long Short-term Memory (Lstm)mentioning
confidence: 99%
“…Machine learning can provide the ability to prevent against even zero-day phishing attacks if provided with enough training data. This methodology, although powerful, is highly dependent on the size and quality of the training dataset and the fine tuning of hyperparameters to obtain optimal accuracy [77].…”
Section: Machine Learningmentioning
confidence: 99%