A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decision, while fuzzy modeling refers to the identification process of the fuzzy parameters. To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. This study explains in detail how fuzzy modeling works by using FA for detecting phishing. Phishing is an unsettled security problem that occurs in the world of internet connected computers. In order to experiment with the proposed method for the security threats, a database of phishing websites and SMS from different sources were ...
Phishing techniques have not only grown in number, but also in sophistication. Phishers might have ...
Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low...
Phishing attacks have become more sophisticated in web-based transactions. As a result, various solu...
Fuzzy system is a rule-based system by using human experts which hold the truth values or membership...
Phishing attack is a well-known cyber security attack that happens to many people around the world. ...
Cyber phishing attacks are increasing rapidly, causing the world economy monetary losses. Although v...
Phishing Websites are forged Web pages that are created by malicious people to mimic Web pages of re...
Phishing websites are forged web pages that are created by malicious people to mimic web pages of re...
A fuzzy system is a rule-based system that uses human expert's knowledge which holds the truth or fa...
Phishing techniques have not only grown in number, but also in sophistication. Phishers might have a...
Detecting and identifying any phishing websites in real-time, particularly for e-banking, is really ...
Phishing attacks has been growing rapidly in the past few years. As a result, a number of approaches...
Abstract- Detecting and identifying any phishing websites in real-time, particularly for e-banking i...
This study investigates and identifies parameters in a single platform based on fuzzy system and neu...
This paper introduces a novel detection method for phishing website attacks while avoiding the issue...
Phishing techniques have not only grown in number, but also in sophistication. Phishers might have ...
Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low...
Phishing attacks have become more sophisticated in web-based transactions. As a result, various solu...
Fuzzy system is a rule-based system by using human experts which hold the truth values or membership...
Phishing attack is a well-known cyber security attack that happens to many people around the world. ...
Cyber phishing attacks are increasing rapidly, causing the world economy monetary losses. Although v...
Phishing Websites are forged Web pages that are created by malicious people to mimic Web pages of re...
Phishing websites are forged web pages that are created by malicious people to mimic web pages of re...
A fuzzy system is a rule-based system that uses human expert's knowledge which holds the truth or fa...
Phishing techniques have not only grown in number, but also in sophistication. Phishers might have a...
Detecting and identifying any phishing websites in real-time, particularly for e-banking, is really ...
Phishing attacks has been growing rapidly in the past few years. As a result, a number of approaches...
Abstract- Detecting and identifying any phishing websites in real-time, particularly for e-banking i...
This study investigates and identifies parameters in a single platform based on fuzzy system and neu...
This paper introduces a novel detection method for phishing website attacks while avoiding the issue...
Phishing techniques have not only grown in number, but also in sophistication. Phishers might have ...
Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low...
Phishing attacks have become more sophisticated in web-based transactions. As a result, various solu...