Performance Evaluation of Phishing Classification Techniques on Various Data Sources and Schemes.
Rahmad AbdillahZarina ShukurMasnizah MohdMohd Zamri MurahInsu OhKangbin YimPublished in: IEEE Access (2023)
Keyphrases
- data sources
- data integration
- data warehouse
- spam filtering
- data collections
- heterogeneous data
- databases
- information sources
- heterogeneous data sources
- structured data
- data model
- identity theft
- integrating heterogeneous
- information integration
- multiple data sources
- distributed data sources
- deep web
- countermeasures
- fraud detection
- xml documents
- social networks
- information retrieval