2015
DOI: 10.14569/ijacsa.2015.061031
|View full text |Cite
|
Sign up to set email alerts
|

The Effect of Feature Selection on Phish Website Detection

Abstract: Abstract-Recently, limited anti-phishing campaigns have given phishers more possibilities to bypass through their advanced deceptions. Moreover, failure to devise appropriate classification techniques to effectively identify these deceptions has degraded the detection of phishing websites. Consequently, exploiting as new; few; predictive; and effective features as possible has emerged as a key challenge to keep the detection resilient. Thus, some prior works had been carried out to investigate and apply certai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 36 publications
0
6
0
Order By: Relevance
“…This algorithm could meet the expectations to a great extent. This calculation demonstrates to have preferred execution over all the strategies utilized in the papers referred (18)(19)(20)(21)(22).…”
Section: Literature Surveymentioning
confidence: 87%
“…This algorithm could meet the expectations to a great extent. This calculation demonstrates to have preferred execution over all the strategies utilized in the papers referred (18)(19)(20)(21)(22).…”
Section: Literature Surveymentioning
confidence: 87%
“…Equation (11) is a linear combination of all of the weak classifiers (simple learners), where K is the total number of weak classifiers, h k (p) is the output of weak classifier t (can only be -1 or 1). α k is the weight applied to classifier k. The final decision is derived by looking at the sign (+/-) of (13 In addition, as pointed out in [160], Adaboost as a classifier might incur issues such as high computational cost and nonscalability. Apart from this, the work does not address any header information, leaving a loophole for number of different types of spam emails.…”
Section: H: Adaboost Based Propositionsmentioning
confidence: 99%
“…This area was determined by the positions of ordinates Fb (4) and Fs (5). Fo area could be determined by ordinates Fs and Fb, so Fo area was Fo= ((x 3 ,y 3 ),(x 2 ,y 3 );(x 3 ,y 2 ),(x 2 ,y 2 )) (7) Ordinate points in (7) were overlapped ordinate points which were, respectively, (x 3 ,y 3 ) which equaled to feature value Fs fpr (min,min), (x 2 ,y 3 …”
Section: Feature Overlap Area (Fo): Fo Was Overlapping Area Of Fbmentioning
confidence: 99%
“…Feature selection is very effective in supporting performance in special tasks [3][4][5][6][7]. Several special tasks in image and computer vision processing are classification [8][9][10], clustering [11], computational neuroscience, imaging genomics [12 and 13], protein property prediction [14], text mining, image annotation, [15 and 16].…”
Section: Introductionmentioning
confidence: 99%