Abstract
… Our phishing detection architecture with possible overall flow is presented in Fig. 1. The six inputs in part A are explained next before moving on to the fuzzy inference systems in part B. …
Cite
CITATION STYLE
APA
A., P., Sexton, G., Hossain, M. A., & Aslam, N. (2014). Parameter optimization for intelligent phishing detection using Adaptive Neuro-Fuzzy. International Journal of Advanced Research in Artificial Intelligence, 3(10). https://doi.org/10.14569/ijarai.2014.031003
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.
Already have an account? Sign in
Sign up for free