2020
DOI: 10.1109/access.2020.3043396
|View full text |Cite
|
Sign up to set email alerts
|

The Answer is in the Text: Multi-Stage Methods for Phishing Detection Based on Feature Engineering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 33 publications
(25 citation statements)
references
References 53 publications
0
18
0
Order By: Relevance
“…The TF-IDF [9] is a method often deployed in information retrieval, text mining, and in recent years it has been applied also in phishing email detection [10] [5]. We applied TF-IDF in the emails' clean text to extract the text-based features.…”
Section: Methods 1: Tf-idfmentioning
confidence: 99%
See 4 more Smart Citations
“…The TF-IDF [9] is a method often deployed in information retrieval, text mining, and in recent years it has been applied also in phishing email detection [10] [5]. We applied TF-IDF in the emails' clean text to extract the text-based features.…”
Section: Methods 1: Tf-idfmentioning
confidence: 99%
“…With 10 features their approach reached 99.95% accuracy with the XGBoost algorithm. An extension of their previous work [5] was presented in [10], where the authors developed a multi-stage approach to discover the purpose of the email (phishing or benign). The text-based features were extracted via the TF-IDF technique and two methods were employed to process the features further.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations