Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
adaptive machine learning based approach
profile
Israel Arroyo
Aerospace
Architectures
Dams Sector
Defense Industrial Base Sector
Emergency Services Sector
Energy Sector
Government Facilities Sector
Healthcare and Public Health Sector
Hybrid Models
Information Technology Sector
Medical Devices
Networked Control
Nuclear Reactors, Materials, and Waste Sector
Probabilistic and Statistical Verification
SCADA Systems
Secure Control Systems
Water and Wastewater Systems Sector
Design Automation Tools
Ground Vehicles
Quantitative Verification
Smart Grid
Communication
Concurrency and Timing
Embedded Software
Model Integration
Real-time Systems
Space Systems
Testing
Control
Defense
Platforms
Time Synchronization
Modeling
Systems Engineering
Real-Time Coordination
Wireless Sensing and Actuation
Health Care
Resilient Systems
Science of System Integration
Robotics
Science of Security
Simulation
Validation and Verification
CPS Technologies
Education
Science Policy
Research Program Overview
security
conference
advanced artificial intelligence deep learning technology
adaptive machine learning based approach
Attacks on IoT Devices
authenticated malicious IoT devices
5G-IoT ubiquitous network
Ohio
biblio
An Adaptive Machine Learning Based Approach for Phishing Detection Using Hybrid Features
Submitted by grigby1 on Fri, 04/10/2020 - 12:36pm
machine learning
World Wide Web
Webpages source code
Web threats
Web sites
web security
URLs
Uniform resource locators
reliable detection system
real-time systems
pubcrawl
phishing Websites
Phishing Detection
phishing attackers
Phishing
adaptive machine learning based approach
Learning Classifier System
learning (artificial intelligence)
internet
intelligent phishing detection
Hypertext systems
hybrid features
Human Factors
Human behavior
feature-rich machine learning technique
feature extraction
cyber security
Computer crime
blacklisting
anti-phishing system