标题
Heuristic nonlinear regression strategy for detecting phishing websites
作者
关键词
-
出版物
SOFT COMPUTING
Volume -, Issue -, Pages -
出版商
Springer Nature
发表日期
2018-02-21
DOI
10.1007/s00500-018-3084-2
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Reliable Control of Discrete-Time Piecewise-Affine Time-Delay Systems via Output Feedback
- (2018) Jianbin Qiu et al. IEEE TRANSACTIONS ON RELIABILITY
- Feature selection based on FDA and F-score for multi-class classification
- (2017) QingJun Song et al. EXPERT SYSTEMS WITH APPLICATIONS
- Reliable Output Feedback Control of Discrete-Time Fuzzy Affine Systems With Actuator Faults
- (2017) Yanling Wei et al. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS
- A Novel Approach to Reliable Control of Piecewise Affine Systems With Actuator Faults
- (2017) Jianbin Qiu et al. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS
- Karush–Kuhn–Tucker Conditions in Set Optimization
- (2017) Johannes Jahn JOURNAL OF OPTIMIZATION THEORY AND APPLICATIONS
- A self adaptive harmony search based functional link higher order ANN for non-linear data classification
- (2016) Bighnaraj Naik et al. NEUROCOMPUTING
- A new algorithm for image recognition and classification based on improved Bag of Features algorithm
- (2016) Kangshun Li et al. OPTIK
- An improved harmony search algorithm with dynamically varying bandwidth
- (2015) J. Kalivarapu et al. ENGINEERING OPTIMIZATION
- A fuzzy discrete harmony search algorithm applied to annual cost reduction in radial distribution systems
- (2015) Kazem Ameli et al. ENGINEERING OPTIMIZATION
- Application of Nonlinear Regression Analysis for Methyl Violet (MV) Dye Adsorption from Solutions onto Illite Clay
- (2015) Baybars Ali Fil et al. JOURNAL OF DISPERSION SCIENCE AND TECHNOLOGY
- Phishing detection based Associative Classification data mining
- (2014) Neda Abdelhamid et al. EXPERT SYSTEMS WITH APPLICATIONS
- Intelligent rule-based phishing websites classification
- (2014) Rami M. Mohammad et al. IET Information Security
- Detection of Forwarding-Based Malicious URLs in Online Social Networks
- (2014) Jian Cao et al. INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING
- Steganalysis of LSB matching using differences between nonadjacent pixels
- (2014) Zhihua Xia et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Hybridizing harmony search algorithm with cuckoo search for global numerical optimization
- (2014) Gai-Ge Wang et al. SOFT COMPUTING
- A survey on applications of the harmony search algorithm
- (2013) D. Manjarres et al. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
- A wrapper approach for feature selection based on Bat Algorithm and Optimum-Path Forest
- (2013) Douglas Rodrigues et al. EXPERT SYSTEMS WITH APPLICATIONS
- Predicting phishing websites based on self-structuring neural network
- (2013) Rami M. Mohammad et al. NEURAL COMPUTING & APPLICATIONS
- Feature selection based on meta-heuristics for biomedicine
- (2013) Ling Wang et al. OPTIMIZATION METHODS & SOFTWARE
- Kalman particle swarm optimized polynomials for data classification
- (2011) Suresh Chandra Satapathy et al. APPLIED MATHEMATICAL MODELLING
- Intelligent phishing detection system for e-banking using fuzzy data mining
- (2010) Maher Aburrous et al. EXPERT SYSTEMS WITH APPLICATIONS
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started