A Comparison of Performance of Rough Set Theory with Machine Learning Techniques in Detecting Phishing Attack.
Arpit SinghSubhas C. MisraPublished in: Honoring Professor Mohammad S. Obaidat (2022)
Keyphrases
- rough set theory
- rough sets
- malicious activities
- attribute reduction
- countermeasures
- approximate reasoning
- rule generation
- decision rules
- decision table
- granular computing
- phishing attacks
- fuzzy set theory
- knowledge discovery
- information entropy
- data analysis
- rule extraction
- identity theft
- tool for data mining
- rule sets
- rule induction
- attribute reduction algorithm
- knowledge reduction
- rough sets theory
- equivalence relation
- security risks
- concept lattice
- data mining
- rough fuzzy
- machine learning
- rough set model
- upper approximation
- real world
- information security
- databases
- real time