Fuzzy modelling using firefly algorithm for phishing detection
A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decision, while fuzzy modeling refers to the identification process of the fuzzy parameters. To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods pro...
| Main Authors: | Noor Syahirah, Nordin, Mohd Arfian, Ismail, Mezhuyev, Vitaliy, Shahreen, Kasim, Mohd Saberi, Mohamad, Ashraf Osman, Ibrahim |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
ASTES Publishers
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/29847/ http://umpir.ump.edu.my/id/eprint/29847/1/Fuzzy%20modelling%20using%20firefly%20algorithm%20for%20phishing%20detection.pdf |
Similar Items
Fuzzy modelling using butterfly optimization algorithm for
phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2020)
by: Noor Syahirah, Nordin, et al.
Published: (2020)
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021)
by: Noor Syahirah, Nordin, et al.
Published: (2021)
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2023)
by: Noor Syahirah, Nordin, et al.
Published: (2023)
Comparative performance of machine learning methods for classification on phishing attack detection
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020)
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020)
Newton competitive genetic algorithm method for optimization the production of biochemical systems
by: Mohd Arfian, Ismail, et al.
Published: (2018)
by: Mohd Arfian, Ismail, et al.
Published: (2018)
Review of the machine learning methods in the classification of phishing attack
by: Jupin, John Arthur, et al.
Published: (2019)
by: Jupin, John Arthur, et al.
Published: (2019)
Multi-objective Optimization of Biochemical System Production
Using an Improve Newton Competitive Differential Evolution Method
by: Mohd Arfian, Ismail, et al.
Published: (2017)
by: Mohd Arfian, Ismail, et al.
Published: (2017)
Optimisation of Biochemical Systems Production using Hybrid of Newton Method, Differential Evolution Algorithm and Cooperative Coevolution Algorithm
by: Mohd Arfian, Ismail, et al.
Published: (2017)
by: Mohd Arfian, Ismail, et al.
Published: (2017)
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
by: Noor Syahirah, Nordin
Published: (2022)
by: Noor Syahirah, Nordin
Published: (2022)
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020)
by: Siti Hawa, Apandi, et al.
Published: (2020)
Real time detection of phishing websites
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
PhishGuard: Machine learning-powered phishing URL detection
by: Murad, Saydul Akbar, et al.
Published: (2023)
by: Murad, Saydul Akbar, et al.
Published: (2023)
Methodology of Domain Specific Mathematical Modelling
by: Mezhuyev, Vitaliy
Published: (2014)
by: Mezhuyev, Vitaliy
Published: (2014)
Development of Metamodels as Logical and Algebraic Systems
by: Mezhuyev, Vitaliy
Published: (2014)
by: Mezhuyev, Vitaliy
Published: (2014)
Designing substitution boxes based on chaotic map and globalized firefly algorithm
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
Improved intrusion detection algorithm based on TLBO and GA algorithms
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Phishing Website Detection using Machine Learning
by: Padmini, Y, et al.
Published: (2024)
by: Padmini, Y, et al.
Published: (2024)
Firefly combinatorial testing strategy
by: Alsewari, Abdulrahman A., et al.
Published: (2019)
by: Alsewari, Abdulrahman A., et al.
Published: (2019)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Comparison of meta-heuristic algorithms for fuzzy modelling of covid-19 illness’ severity classification
by: Nur Azieta, Mohamad Aseri, et al.
Published: (2022)
by: Nur Azieta, Mohamad Aseri, et al.
Published: (2022)
Newton competitive genetic algorithm method for optimization the production of biochemical systems
by: Ismail, Mohd Arfian, et al.
Published: (2018)
by: Ismail, Mohd Arfian, et al.
Published: (2018)
An enhanced model to increase awareness on phishing attacks for vocational students
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
Breast cancer disease classification using fuzzy-ID3 algorithm based on association function
by: Nur Farahaina, Idris, et al.
Published: (2022)
by: Nur Farahaina, Idris, et al.
Published: (2022)
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
by: Aljanabi, Mohammad, et al.
Published: (2020)
by: Aljanabi, Mohammad, et al.
Published: (2020)
Design and process metamodels for modelling and verification of safety-related software applications in smart building systems
by: Murni, Fatehah, et al.
Published: (2018)
by: Murni, Fatehah, et al.
Published: (2018)
Ontology-based Development of the Metamodels for Modelling Distributed Parallel Software Systems
by: Malakhov, Eugene, et al.
Published: (2015)
by: Malakhov, Eugene, et al.
Published: (2015)
Selective mode excitation techniques for mode-division multiplexing: A critical review
by: Fazea, Yousef, et al.
Published: (2018)
by: Fazea, Yousef, et al.
Published: (2018)
Optimization of biochemical systems production using combination of newton method and particle swarm optimization
by: Mohd Arfian, Ismail, et al.
Published: (2019)
by: Mohd Arfian, Ismail, et al.
Published: (2019)
A comparative analysis on artificial intelligence techniques for web phishing classification
by: Tengku Balqis, Tengku Abd Rashid, et al.
Published: (2020)
by: Tengku Balqis, Tengku Abd Rashid, et al.
Published: (2020)
An Enhanced Model for Increasing Awareness of Vocational Students Against Phishing Attacks
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
Model for phishing websites classification using artificial neural network
by: Hassan, N. H., et al.
Published: (2021)
by: Hassan, N. H., et al.
Published: (2021)
Enhancing the Awareness Level on Phishing Attacks Among Malaysians: Analysis and Recommendations
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2018)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2018)
Comparative analysis of machine learning classifiers for phishing detection
by: Mohd Faizal, Ab Razak, et al.
Published: (2022)
by: Mohd Faizal, Ab Razak, et al.
Published: (2022)
Examining the effect of Knowledge Management factors on Mobile Learning adoption through the use of Importance-Performance Map Analysis (IPMA)
by: Al-Emran, Mostafa, et al.
Published: (2019)
by: Al-Emran, Mostafa, et al.
Published: (2019)
An Improved gSVM-SCADL2 with Firefly Algorithm for Identification of Informative Genes and Pathways
by: Chan, Weng Howe, et al.
Published: (2016)
by: Chan, Weng Howe, et al.
Published: (2016)
Firefly combinatorial test list generator for IoT systems
by: Alsewari, Abdulrahman A., et al.
Published: (2018)
by: Alsewari, Abdulrahman A., et al.
Published: (2018)
Firefly combinatorial test list generator for IoT systems
by: Alsewari, Abdulrahman A., et al.
Published: (2018)
by: Alsewari, Abdulrahman A., et al.
Published: (2018)
Phishing website detection
by: Nur Sholihah, Zaini
Published: (2018)
by: Nur Sholihah, Zaini
Published: (2018)
Estimating the Efficiency of Information Technology for Domain-Specific Mathematical Modelling
by: Mezhuyev, Vitaliy, et al.
Published: (2015)
by: Mezhuyev, Vitaliy, et al.
Published: (2015)
In silico gene knockout prediction using a hybrid of Bat algorithm and minimization of metabolic adjustment
by: Man, Mei Yen, et al.
Published: (2021)
by: Man, Mei Yen, et al.
Published: (2021)
Similar Items
-
Fuzzy modelling using butterfly optimization algorithm for
phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2020) -
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021) -
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2023) -
Comparative performance of machine learning methods for classification on phishing attack detection
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020) -
Newton competitive genetic algorithm method for optimization the production of biochemical systems
by: Mohd Arfian, Ismail, et al.
Published: (2018)