Fuzzy modelling using butterfly optimization algorithm for phishing detection
Fuzzy system is a rule-based system by using human experts which hold the truth values or membership values to make a particular decision while fuzzy modelling is a process of identifying the fuzzy parameter. However, it is difficult to generate fuzzy parameter manually when applied on complex probl...
| Main Authors: | Noor Syahirah, Nordin, Mohd Arfian, Ismail, Nurul Aswa, Omar |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
World Academy of Research in Science and Engineering
2020
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/30869/ http://umpir.ump.edu.my/id/eprint/30869/1/Paper_MCP19006.pdf |
Similar Items
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2023)
by: Noor Syahirah, Nordin, et al.
Published: (2023)
Fuzzy modelling using firefly algorithm for phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2019)
by: Noor Syahirah, Nordin, et al.
Published: (2019)
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021)
by: Noor Syahirah, Nordin, et al.
Published: (2021)
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020)
by: Siti Hawa, Apandi, et al.
Published: (2020)
Real time detection of phishing websites
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
Comparative performance of machine learning methods for classification on phishing attack detection
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020)
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020)
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
by: Noor Syahirah, Nordin
Published: (2022)
by: Noor Syahirah, Nordin
Published: (2022)
Improved intrusion detection algorithm based on TLBO and GA algorithms
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
PhishGuard: Machine learning-powered phishing URL detection
by: Murad, Saydul Akbar, et al.
Published: (2023)
by: Murad, Saydul Akbar, et al.
Published: (2023)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Model for phishing websites classification using artificial neural network
by: Hassan, N. H., et al.
Published: (2021)
by: Hassan, N. H., et al.
Published: (2021)
An enhanced model to increase awareness on phishing attacks for vocational students
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
Phishing Website Detection using Machine Learning
by: Padmini, Y, et al.
Published: (2024)
by: Padmini, Y, et al.
Published: (2024)
An Enhanced Model for Increasing Awareness of Vocational Students Against Phishing Attacks
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
A comparative analysis on artificial intelligence techniques for web phishing classification
by: Tengku Balqis, Tengku Abd Rashid, et al.
Published: (2020)
by: Tengku Balqis, Tengku Abd Rashid, et al.
Published: (2020)
Enhancing the Awareness Level on Phishing Attacks Among Malaysians: Analysis and Recommendations
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2018)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2018)
Fuzzy modeling using Bat Algorithm optimization for classification
by: Noor Amidah, Ahmad Sultan
Published: (2018)
by: Noor Amidah, Ahmad Sultan
Published: (2018)
Neural networks optimization through genetic algorithm searches: A review
by: Chiroma, Haruna, et al.
Published: (2017)
by: Chiroma, Haruna, et al.
Published: (2017)
Comparative analysis of machine learning classifiers for phishing detection
by: Mohd Faizal, Ab Razak, et al.
Published: (2022)
by: Mohd Faizal, Ab Razak, et al.
Published: (2022)
Newton competitive genetic algorithm method for optimization the production of biochemical systems
by: Mohd Arfian, Ismail, et al.
Published: (2018)
by: Mohd Arfian, Ismail, et al.
Published: (2018)
Software module clustering based on the fuzzy adaptive teaching learning based optimization algorithm
by: Kamal Z., Zamli, et al.
Published: (2019)
by: Kamal Z., Zamli, et al.
Published: (2019)
Phishing website detection
by: Nur Sholihah, Zaini
Published: (2018)
by: Nur Sholihah, Zaini
Published: (2018)
Web Phishing Classification Model using Artificial Neural Network and Deep Learning Neural Network
by: Noor Hazirah, Hassan, et al.
Published: (2023)
by: Noor Hazirah, Hassan, et al.
Published: (2023)
Android mobile malware detection using Fuzzy AHP
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Data mining in network traffic using fuzzy clustering
by: Mohamad, Shamsul
Published: (2003)
by: Mohamad, Shamsul
Published: (2003)
Smell Phishy : A 2d Platform Game For Phishing Awareness
by: Ng, Man Teng
Published: (2023)
by: Ng, Man Teng
Published: (2023)
Review of the machine learning methods in the classification of phishing attack
by: Jupin, John Arthur, et al.
Published: (2019)
by: Jupin, John Arthur, et al.
Published: (2019)
Smart object detection using deep learning algorithm and jetson nano for blind people
by: Tan, Mei Yan, et al.
Published: (2021)
by: Tan, Mei Yan, et al.
Published: (2021)
FLGA Traffic Controller With Fuzzy Logic Algorithm: Fuzzy Traffic Controller
by: Lim, Khai Teng
Published: (2003)
by: Lim, Khai Teng
Published: (2003)
A new online updating framework for constructing monotonicity-preserving Fuzzy Inference Systems
by: Kai, Meng Tay, et al.
Published: (2013)
by: Kai, Meng Tay, et al.
Published: (2013)
Ransomware: Stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021)
Feature-based phishing detection technique
by: Xin, Mei Choo, et al.
Published: (2016)
by: Xin, Mei Choo, et al.
Published: (2016)
An experimental study of a fuzzy adaptive emperor penguin optimizer for global optimization problem
by: Kader, Md. Abdul, et al.
Published: (2022)
by: Kader, Md. Abdul, et al.
Published: (2022)
Optimization of ship routing using hybrid genetic algorithm / Ismail
by: ., Ismail
Published: (2014)
by: ., Ismail
Published: (2014)
Back Propagation Algorithm-Based Intelligent Model for Botnet Detection
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
Machine learning technique for phishing website detection
by: Nurul Amira, Mohd Zin, et al.
by: Nurul Amira, Mohd Zin, et al.
Opposition-based Whale Optimization Algorithm
by: Alamri, Hammoudeh S., et al.
Published: (2018)
by: Alamri, Hammoudeh S., et al.
Published: (2018)
Enhancing generic code clone detection model for C based application
by: Ainun Syahirah, Adnan
Published: (2019)
by: Ainun Syahirah, Adnan
Published: (2019)
A novel algorithm : apriori-ant. The combination of apriori algorithm and ants colony optimization algorithm
by: Choo, Ai Ling
Published: (2005)
by: Choo, Ai Ling
Published: (2005)
Evaluating Machine Learning Algorithms for Fake Currency Detection
by: Keerthana, S.N, et al.
Published: (2024)
by: Keerthana, S.N, et al.
Published: (2024)
Similar Items
-
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2023) -
Fuzzy modelling using firefly algorithm for phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2019) -
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021) -
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020) -
Real time detection of phishing websites
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)