2020
DOI: 10.1016/j.procs.2020.03.294
|View full text |Cite
|
Sign up to set email alerts
|

PhishStack: Evaluation of Stacked Generalization in Phishing URLs Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…In the stacking method [ 27 ], the primary learner is trained first, and then the prediction result of the primary learner is used as the new input to train the secondary learner. In the training phase, the secondary learner is generated by the primary learner.…”
Section: Ensemble Modelmentioning
confidence: 99%
“…In the stacking method [ 27 ], the primary learner is trained first, and then the prediction result of the primary learner is used as the new input to train the secondary learner. In the training phase, the secondary learner is generated by the primary learner.…”
Section: Ensemble Modelmentioning
confidence: 99%
“…They summarize the data concisely, and the placement of the box and whisker markers makes it simple to compare the classification accuracy. More information on the performance indicators can be found in [27], [30].…”
Section: Performance Evaluationmentioning
confidence: 99%
“…This illicit activity exploits social networking technologies and platforms to amass a target's identity data and account information. In the effective counteraction of spam emails, diverse techniques and principles have been devised, where email filtering assumes a pivotal position [3] [4]. Email filtering involves an array of approaches, incorporating mechanisms like blacklisting, visual similarity assessments, heuristics, and machine learning algorithms.…”
Section: Introductionmentioning
confidence: 99%