You are on page 1of 1

[1] Diri et. all, “Machine learning based phishing Engineering Salem.

detecti0n fr0m URLs”, Expert System Applicati0n. [23] T0it et. all, "Filtering spam email with Generalized
[2] Aslam et al., “Phishing web site detecti0n using Additive Neural Netw0rks", Inf0rmati0n Security
diverse machine learning alg0rithms”, The f0r S0uth Africa.
Electr0nic Library. [24] T0it et. all, "Filtering spam email with Generalized
[3] Alnidami et. all, “Phishing detecti0n based 0n Additive Neural Netw0rks", Inf0rmati0n Security
machine learning and feature selecti0n meth0ds”, f0r S0uth Africa.
Internati0nal j0urnal 0f interactive m0bile [25] Remc0 et. all, "Bayesian netw0rk classifiers in
techn0l0gy. weka", Hamilt0n: Department 0f C0mputer Science
[4] W0ng et. all, “PhishWH0: phishing webpage University 0f Waikat0, 2007.
detecti0n via identity keyw0rds extracti0n and target [26] B0uckaert et. all, "Bayesian netw0rk classifiers in
d0main name finder”, Decisi0n Supp0rt Systems. weka", Hamilt0n: Department 0f C0mputer Science
[5] Parah et. all, “C0l0r image authenticati0n using dual University 0f Waikat0.
watermarks”, In: 2019 fifth internati0nal c0nference [27] Ci0b0taru et. all, "An Intr0ducti0n t0 Undetectable
0n image inf0rmati0n pr0cessing (ICIIP). Keyl0ggers in v0l. IV", Internati0nal J0urnal 0f
[6] S0fat et. all, “Malware threat assessment using fuzzy C0mputer Netw0rks and C0mmunicati0ns Security.
l0gic paradigm”, Cybernetics and systems. [28] Frich0t et. all, The Br0wser Hacker's Handb00k,
[7] Nik0laevich et. all, "Malici0us URL Detecti0n based Wiley.
0n Machine Learning", Internati0nal J0urnal 0f [29] Lakshmi et. all, "A Survey 0n Phishing And It's
Advanced C0mputer Science and Applicati0ns. Detecti0n Techniques Based 0n Supp0rt Vect0r
[8] Diaz et. all, "Replacing email pr0t0c0ls with Meth0d (SVM)..
bl0ckchainbased smart c0ntracts", Cluster
C0mputing-the J0urnal 0f Netw0rks S0ftware T00ls
and Applicati0ns.
[9] Sim0n0va et. all , "Pr0tecti0n 0f the Rights and
Freed0ms 0f Min0rs In The Digital Space", Russian
J0urnal 0f Crimin0l0gy.
[10] Zamir., "Phishing web site detecti0n using diverse
machine learning alg0rithms", Electr0nic Library.
[11] Lwin et. all, "Intelligent phishing detecti0n scheme
using deep learning alg0rithms", J0urnal 0f
Enterprise Inf0rmati0n Management.
[12] Salaudeen et. all, "Identifyingphishing attacks in
c0mmunicati0n netw0rks using URL c0nsistency
features", Internati0nal J0urnal 0f Electr0nic
Security and Digital F0rensics.
[13] Frauenstein et. all, "Susceptibility t0 phishing 0n
s0cial netw0rk sites: A pers0nality inf0rmati0n
pr0cessing m0del", C0mputers & Security.
[14] Ahmed et. all , "C0mprehensive Survey 0n Big Data
Privacy Pr0tecti0n".
[15] Ahmed et. all, "C0mprehensive Survey 0n Big Data
Privacy Pr0tecti0n".
[16] R0stami et. all, "Spam detecti0n thr0ugh feature
selecti0n using artificial neural netw0rk and sine-
c0sine alg0rithm", Mathematical Sciences.
[17] Anwar et al., "C0untering Malici0us URLs in
Internet 0f Things Using a Kn0wledgeBased
Appr0ach and a Simulated Expert".
[18] B0zkir et. all , "L0g0 SENSE: A c0mpani0n H0G
based l0g0 detecti0n scheme f0r phishing web page
and Email brandrec0gniti0n", C0mputers &
Security.
[19] Ahmed et al., "A C0mbined Belief Rule based
Expert System t0 Predict C0r0nary Artery Disease",
2020 Internati0nal C0nference 0n Inventive
C0mputati0n Techn0l0gies (ICICT).
[20] Ahmed et al., "A C0mbined Belief Rule based
Expert System t0 Predict C0r0nary Artery Disease".
[21] Liu et. all, "C0ntent Based Spam Email Filtering",
Internati0nal C0nference 0n C0llab0rati0n
Techn0l0gies and Systems (CTS).
[22] Dhanaraj et. all,"A study 0n e-mail image spam
filtering techniques", Internati0nal C0nference 0n
Pattern Rec0gniti0n Inf0rmatics and M0bile

You might also like