Login / Signup
Replication: Challenges in Using Data Logs to Validate Phishing Detection Ability Metrics.
Casey Inez Canfield
Alex Davis
Baruch Fischhoff
Alain Forget
Sarah Pearman
Jeremy Thomas
Published in:
SOUPS (2017)
Keyphrases
</>
data sets
real world
raw data
log data
missing data
statistical analysis
data collection
data processing
data structure
image data
object detection
false positives
spatial data
data quality
fault tolerant
database
data sources
data mining techniques
xml documents
email
data analysis
detection method
search engine