Phishing detection based associative classification data mining
Website phishing is considered one of the crucial security challenges for the online
community due to the massive numbers of online transactions performed on a daily basis …
community due to the massive numbers of online transactions performed on a daily basis …
A MapReduce solution for associative classification of big data
Associative classifiers have proven to be very effective in classification problems.
Unfortunately, the algorithms used for learning these classifiers are not able to adequately …
Unfortunately, the algorithms used for learning these classifiers are not able to adequately …
New associative classification method based on rule pruning for classification of datasets
KD Rajab - Ieee Access, 2019 - ieeexplore.ieee.org
In data mining, a rule-based classification approach called Associative Classification (AC)
normally builds accurate classifiers from supervised learning data sets. It extracts “If-Then” …
normally builds accurate classifiers from supervised learning data sets. It extracts “If-Then” …
A novel associative classification model based on a fuzzy frequent pattern mining algorithm
Associative classification models are based on two different data mining paradigms, namely
pattern classification and association rule mining. These models are very popular for …
pattern classification and association rule mining. These models are very popular for …
[PDF][PDF] An Improved Multi-Class Classification Algorithm based on Association Classification Approach and its Application to Spam Emails.
RMA Mohammad - IAENG International Journal of Computer Science, 2020 - iaeng.org
In our everyday life, we may use email for personal and professional matters. Yet, email
benefits have been bedeviled with the remarkable use of annoying, harmful, and fraudulent …
benefits have been bedeviled with the remarkable use of annoying, harmful, and fraudulent …
Rule-based Detection of Anomalous Patterns in Device Behavior for Explainable IoT Security
The behavioral analysis of smart devices plays a key role in enforcing security for IoT
environments. In particular, anomalous patterns can be targeted in the behavior of smart …
environments. In particular, anomalous patterns can be targeted in the behavior of smart …
[PDF][PDF] Emerging trends in associative classification data mining
Utilising association rule discovery to learn classifiers in data mining is known as
Associative Classification (AC). In the last decade, AC algorithms proved to be effective in …
Associative Classification (AC). In the last decade, AC algorithms proved to be effective in …
[HTML][HTML] An application for predicting phishing attacks: A case of implementing a support vector machine learning model
The imminent threat that phishing websites poses is a major concern for internet users
worldwide. These fraudulent websites are crafted by cyber attackers to appear trustworthy …
worldwide. These fraudulent websites are crafted by cyber attackers to appear trustworthy …
A Review Selection Method Based on Consumer Decision Phases in E-commerce
J Zhang, X Li, L Wang - ACM Transactions on Information Systems, 2023 - dl.acm.org
A valuable small subset strategically selected from massive online reviews is beneficial to
improve consumers' decision-making efficiency in e-commerce. Existing review selection …
improve consumers' decision-making efficiency in e-commerce. Existing review selection …
Hierarchical clustering of XML documents focused on structural components
Clustering XML documents by structure is the task of grou** them by common structural
components. Hitherto, this has been accomplished by looking at the occurrence of one …
components. Hitherto, this has been accomplished by looking at the occurrence of one …