O'Reilly logo

A Machine-Learning Approach to Phishing Detection and Defense by E. Fazeldehkordi, O.A. Akanbi, Iraj Sadegh Amiri

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6

Conclusions

Abstract

This is the concluding chapter of this study, which implies that it includes a recap of all the previous chapters. First, a concluding remark is given discussing the importance of this study in mitigating the risk incurred by online users to phishing websites. Furthermore, the objectives of the study are summarized in phases of our research methodology discussed in Chapter 3. Second, our contribution to this research area is analyzed and discussed in different stages of implementation. However, because of the broadness of the research area, we discussed the scope of our research in Chapter 1 to a time-feasible scope. Furthermore, during the course of the study, we realized prospective field of study to expand on ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required