O'Reilly logo

A Machine-Learning Approach to Phishing Detection and Defense by E. Fazeldehkordi, O.A. Akanbi, Iraj Sadegh Amiri

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4

Feature Extraction

Abstract

This chapter extensively discusses the dataset preprocessing techniques and how the features are extracted from the dataset. It started off with an introductory chapter that also covers the structural overview of the sections in this chapter. The next section discusses the processing techniques introduced on the dataset followed by the feature extraction process, which includes the description of the extracted features. Furthermore, the verification of the data used is discussed in the following section that leads to the normalization technique used in the data processing. The normalization process prepares the dataset before introducing it to the classifiers for classification. Perhaps, the process of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required