O'Reilly logo

A Machine-Learning Approach to Phishing Detection and Defense by E. Fazeldehkordi, O.A. Akanbi, Iraj Sadegh Amiri

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

Implementation and Result

Abstract

This chapter discusses the process of implementation and the results obtained. First, a recap of the objective is discussed and the process of attaining this objective is also discussed in brief. In addition, an overview of the investigation is illustrated with a flowchart introducing the scope of the chapter. Second, we give a detailed experimental setup for our implementation – training and testing model that includes the key parameters used in our implementation, the performance of each classifier using the same performance metrics, and the design of our ensemble classifier including the method of voting used in selecting the best ensemble classifier. Interestingly, because of the voting method ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required