Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
phishing attack detection
biblio
Phishing Attack Detection using Machine Learning Classification Techniques
Submitted by grigby1 on Thu, 03/04/2021 - 2:57pm
Metrics
Zero day attacks
Uniform resource locators
Training
Resiliency
resilience
pubcrawl
phishing attack detection
phishing attack
Phishing
Artificial Intelligence
machine learning
Logistics
defense
Decision Tree
Conferences
computer science
composability
Classification algorithms
biblio
Detecting Phishing Attacks Using Natural Language Processing and Machine Learning
Submitted by aekwall on Mon, 05/18/2020 - 10:53am
phishing attack detection
unsolicited e-mail
Uniform resource locators
text analysis
social engineering
Semantics
security threats
Scalability
Resiliency
pubcrawl
phishing emails
blacklisting
Phishing
natural language text
natural language processing
malicious intent detection
machine learning
learning (artificial intelligence)
inappropriate statements detection
Human behavior
Electronic mail
Computer crime
biblio
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
Submitted by grigby1 on Tue, 11/26/2019 - 3:47pm
random forests
pattern classification
personal information
Phishing
phishing attack detection
Phishing Detection
phishing Web sites
pubcrawl
random forest classification
machine learning-based strategies
rough set theory
Rough sets
Training
Uniform resource locators
universal feature set
Web pages
Web sites
Fuzzy Rough Set
Computer crime
confidential information
cybercrime activities
definitive features
Electronic mail
feature extraction
Feature Selection
FRS feature selection
classifiers
fuzzy rough set feature selection
fuzzy rough set theory
fuzzy set theory
generalizable phishing detection
Human behavior
human factor
legitimate Web site