Performance Assessment of some Phishing predictive models based on Minimal Feature corpus

  • Abdul Abiodun O
  • A.S S
  • S.O K
  • et al.
N/ACitations
Citations of this article
12Readers
Mendeley users who have this article in their library.

Abstract

The credentials harvested normally include bank account numbers, passwords or PINs, credit card numbers, security questions, security codes etc. In most instances, vulnerability to phishing threat is due to the ease with which unsuspecting online users navigate web pages using links or URL within a body of an online message (Han et al. 2012). [...]there is an increased motivation for phishers as the number of mobile-connected devices accessing social media sites continues to grow. The limitation is often connected with superfluous training/testing time which may result in high memory overheads, delay in detection time, expensive maintenance/update etc. [...]responsiveness is used to measure prediction accuracy with commensurate processing time while the response time is used to ensure that the detection time for any window of vulnerability is reasonable and insignificant (Silva et al. 2020). In this work, we proposed an approach to examining the different state of art predictive model using reduced phishing feature corpus to resolve the uncertainties that result from performance issues (responsiveness) and other inconsistencies (response time, computational overhead etc.) in the feature set corpus.

Cite

CITATION STYLE

APA

Abdul Abiodun, O., A.S, S., S.O, K., & B, O. G. (2021). Performance Assessment of some Phishing predictive models based on Minimal Feature corpus. Journal of Digital Forensics, Security and Law, 16(1). https://doi.org/10.58940/1558-7223.1692

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free