Proceedings of the 2nd International Conference on Machine Learning and Soft Computing 2018
DOI: 10.1145/3184066.3184082
|View full text |Cite
|
Sign up to set email alerts
|

An anti-phishing method based on feature analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
3

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(19 citation statements)
references
References 17 publications
0
16
0
3
Order By: Relevance
“…CFS sorts features based on their correlation with the target class. The first-ranked feature has highest correlation with the target class and lowest correlation with the others [13]. DW utilizes a combination of decision tree and Wrapper to select an optimal feature set [14].…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…CFS sorts features based on their correlation with the target class. The first-ranked feature has highest correlation with the target class and lowest correlation with the others [13]. DW utilizes a combination of decision tree and Wrapper to select an optimal feature set [14].…”
Section: Methodsmentioning
confidence: 99%
“…Furthermore, DW is dependent on the expert opinion to decide what decreasing in the accuracy should be considered as significant to stop the method. In this work, the thresholds and other settings are set based on the values suggested in [13] and [14]. Figure 2 presents the F-measure values for classifiers using four feature selection algorithms over each data set.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The best way to solve phishing is design strict user education programs that not only assist users recognize fraudulent email, but also provide particular advice on how to manage suspicious communication (Rajab, 2018). In the parts below, it will concentrate on safe handling of email that violate the software layer's safety.…”
Section: Prevention Techniques From Phishing Attackmentioning
confidence: 99%