Visible to the public Phishing websites classifier using polynomial neural networks in genetic algorithm

TitlePhishing websites classifier using polynomial neural networks in genetic algorithm
Publication TypeConference Paper
Year of Publication2017
AuthorsGayathri, S.
Conference Name2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)
PublisherIEEE
ISBN Number978-1-5090-4740-6
KeywordsAI techniques, artificial intelligence, brain, chromosome recombination operators, classification techniques, Computer crime, data classification, data mining, data structure, data structures, Error analysis, genetic algorithm, Genetic Algorithm (GA), genetic algorithms, Human Behavior, human factors, improved polynomial neural networks, neural nets, Neural network (NN), Neural networks, neural networks techniques, phishing, phishing Websites classifier, pubcrawl, Sociology, Statistics, Web sites
Abstract

Genetic Algorithms are group of mathematical models in computational science by exciting evolution in AI techniques nowadays. These algorithms preserve critical information by applying data structure with simple chromosome recombination operators by encoding solution to a specific problem. Genetic algorithms they are optimizer, in which range of problems applied to it are quite broad. Genetic Algorithms with its global search includes basic principles like selection, crossover and mutation. Data structures, algorithms and human brain inspiration are found for classification of data and for learning which works using Neural Networks. Artificial Intelligence (AI) it is a field, where so many tasks performed naturally by a human. When AI conventional methods are used in a computer it was proved as a complicated task. Applying Neural Networks techniques will create an internal structure of rules by which a program can learn by examples, to classify different inputs than mining techniques. This paper proposes a phishing websites classifier using improved polynomial neural networks in genetic algorithm.

URLhttps://ieeexplore.ieee.org/document/8085736
DOI10.1109/ICSCN.2017.8085736
Citation Keygayathri_phishing_2017