“…Yet, it is difficult to interpret the SVM, and it is quite memory sensitive. We noticed that numerous scientific papers, such as [44]- [50], [53]- [56], [58], [61], [63], [66], [70], [71], [73], [80], [87]- [89], [91], [94], [96], [97], [99], [101], [102], [106]- [110], [112], [114]- [128] have used SVM algorithm to detect phishing emails.…”