2017 IEEE International Symposium on Parallel and Distributed Processing With Applications and 2017 IEEE International Conferen 2017
DOI: 10.1109/ispa/iucc.2017.00160
|View full text |Cite
|
Sign up to set email alerts
|

Phishing Emails Detection Using CS-SVM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(18 citation statements)
references
References 4 publications
0
18
0
Order By: Relevance
“…This method uses the measures of a true positive rate, a false positive rate, and an accuracy as evaluation metric to evaluate the performance. CS-SVM shows a 91 percent higher result in terms of phishing email detection accuracy at different training sets when compared with traditional SVM classifier [10].…”
Section: Related Workmentioning
confidence: 96%
See 1 more Smart Citation
“…This method uses the measures of a true positive rate, a false positive rate, and an accuracy as evaluation metric to evaluate the performance. CS-SVM shows a 91 percent higher result in terms of phishing email detection accuracy at different training sets when compared with traditional SVM classifier [10].…”
Section: Related Workmentioning
confidence: 96%
“…The method [9] is not flexible to accommodate the increasing number of consumers, therefore it will be difficult to provide a unique code to each user. Authors [10] proposed phishing emails detection using Cuckoo Search SVM (CS-SVM). Cuckoo Search algorithm was used for parameter selection.…”
Section: Related Workmentioning
confidence: 99%
“…Over the years, cyber-security firms have extensively utilized Machine Learning for detecting Phishing URLs and malicious sites. These works ranged from SVM [52,20,28], Random Forest [40,19], KNN [41,45] and a combinations of this techniques [8,32]. After the advent of Deep Learning, Convolutional Neural Networks (CNN) and Recurrent Neural Networks (RNN) have become the norm for automated feature extraction from a huge volume of data without any human intervention.…”
Section: Literature Reviewmentioning
confidence: 99%
“…An email is divided into three components: Email header, Email body and the URL for more detailed extraction. The second stage focuses on phishing email classifier using Cuckoo Search (CS) and Support Vector Machine (SVM) algorithm to produce the result the verify whether the email is phishing or non-phishing email [4].…”
Section: Related Workmentioning
confidence: 99%