2010 Second International Conference on Information Technology and Computer Science 2010
DOI: 10.1109/itcs.2010.16
View full text |Buy / Rent full text
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 16 publications
0
9
0
Order By: Relevance
“…2(a) . Whereas C j is the label of the class such that * + with and , which indicates the membership of W j in the phish class or in the legitimate class based on its corresponding features [38,39] as portrayed in Fig. 2(b).…”
Section: A Test-bed and Featuresmentioning
confidence: 99%
“…2(a) . Whereas C j is the label of the class such that * + with and , which indicates the membership of W j in the phish class or in the legitimate class based on its corresponding features [38,39] as portrayed in Fig. 2(b).…”
Section: A Test-bed and Featuresmentioning
confidence: 99%
“…• degree of computerization for information extraction systems Fu et al (2010) described a method for guiding the content extraction process, using the webpage layout information. They proposed a four aspects on some specific websites, attribute to as web bases, that afford a complex HTML search form for the users to querying the back-end databases Wang (2003).…”
Section: Related Workmentioning
confidence: 99%
“…Some researchers proposed techniques [4] [5], which require multiple pages for the extraction process. Only some techniques [6] [7] are able to work on single page. In addition, some works proposed are only aimed to extract specific Web content such as shopping data, news.…”
Section: Related Workmentioning
confidence: 99%