Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 17 publications
0
13
0
Order By: Relevance
“…Firstly, JRip and PART are sets of non-complex rules and could be integrated easily with any IDS system. Secondly, even though other classification algorithms are available, JRip and PART classifiers are used by many researchers in their recent work (Faizal et al, 2018;Kumar, Viinikainen & Hamalainen, 2018;Adewole et al, 2019). Thirdly, the proposed approach assumed that the hybridisation of the two classifiers would improve the output result; thereby, the final detection model rule is a hybrid of extracted rules from both PART and JRip output.…”
Section: Ratio_suc_respmentioning
confidence: 99%
“…Firstly, JRip and PART are sets of non-complex rules and could be integrated easily with any IDS system. Secondly, even though other classification algorithms are available, JRip and PART classifiers are used by many researchers in their recent work (Faizal et al, 2018;Kumar, Viinikainen & Hamalainen, 2018;Adewole et al, 2019). Thirdly, the proposed approach assumed that the hybridisation of the two classifiers would improve the output result; thereby, the final detection model rule is a hybrid of extracted rules from both PART and JRip output.…”
Section: Ratio_suc_respmentioning
confidence: 99%
“…The detection performances of the developed phishing models are evaluated using Accuracy, F-measure, Area under the Curve (AUC), falsepositive rate (FPR), true positive rate (TPR), and Mathew's correlation coefficient (MCC) performance evaluation metric. Preference for these metrics is based on the wide and frequent usage of these evaluation metrics for phishing website detection from existing studies [2,4,10,11,34,36]. i.…”
Section: Performance Evaluation Metricsmentioning
confidence: 99%
“…The increasing acceptance and adoption of information technology (IT) have led to an increase in the number of web-based solutions provided via cyberspace [1]. These activities range from essential services such as financial transactions to basic activities like e-health applications and education [2,3]. Research has shown that financial transactions, online gaming services and social media are considered top web-based solutions with vast popularity and enormous users.…”
Section: Introductionmentioning
confidence: 99%
“…In the last decade, several studies like Zamir et al [5], Nepali and Wang [2], Adewole et al [7], Kuyama et al [8],…”
Section: Introductionmentioning
confidence: 99%