2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS) 2022
DOI: 10.1109/ictacs56270.2022.9987839
|View full text |Cite
|
Sign up to set email alerts
|

Phishing Detection in E-mails using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…Many machine-learning (ML) techniques exist to classify emails into predefined categories, such as supervised ML, semi-supervised ML, unsupervised ML, content-based learning, and statistical learning, [2]. Some of the algorithms used supervised learning concept are support vector machine (SVM), genetic algorithms (GA) [3], decision trees (DT) [4], random forest (RF) [5], Naïve bayes (NB) [6], k-nearest neighbor (KNN) [7], and artificial neural network (ANN) [8]. The unstructured, noisy, and highly dimensional data in each email makes it difficult to develop an email classifier for a real-time dataset.…”
Section: Introductionmentioning
confidence: 99%
“…Many machine-learning (ML) techniques exist to classify emails into predefined categories, such as supervised ML, semi-supervised ML, unsupervised ML, content-based learning, and statistical learning, [2]. Some of the algorithms used supervised learning concept are support vector machine (SVM), genetic algorithms (GA) [3], decision trees (DT) [4], random forest (RF) [5], Naïve bayes (NB) [6], k-nearest neighbor (KNN) [7], and artificial neural network (ANN) [8]. The unstructured, noisy, and highly dimensional data in each email makes it difficult to develop an email classifier for a real-time dataset.…”
Section: Introductionmentioning
confidence: 99%