2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE) 2018
DOI: 10.1109/icitisee.2018.8720975
|View full text |Cite
|
Sign up to set email alerts
|

Algorithm Evaluation for Classification “Phishing Website” Using Several Classification Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…This paper is focused especially on the collection of phishing data, the data mining step of knowledge discovery and the creation of a Chrome plugin for data collection and phishing detection. The interest of academics in the data mining step for the purposes of phishing detection has been shown in several papers [5], [9], [14]. One of the most popular algorithms for the data mining step is the C4.5 algorithm creating an easily interpretable decision tree for classification [15], [7].…”
Section: Introductionmentioning
confidence: 99%
“…This paper is focused especially on the collection of phishing data, the data mining step of knowledge discovery and the creation of a Chrome plugin for data collection and phishing detection. The interest of academics in the data mining step for the purposes of phishing detection has been shown in several papers [5], [9], [14]. One of the most popular algorithms for the data mining step is the C4.5 algorithm creating an easily interpretable decision tree for classification [15], [7].…”
Section: Introductionmentioning
confidence: 99%