A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
Fuzzy system is one of the most used systems in the decision-making and classification method as it is easy to understand because the way this system works is closer to how humans think. It is a system that uses human experts to hold the membership values to make decisions. However, it is hard to de...
| Main Authors: | Noor Syahirah, Nordin, Mohd Arfian, Ismail |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Springer Science and Business Media Deutschland GmbH
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/40776/ http://umpir.ump.edu.my/id/eprint/40776/1/A%20hybridization%20of%20butterfly%20optimization%20algorithm%20and%20harmony.pdf http://umpir.ump.edu.my/id/eprint/40776/2/A%20hybridization%20of%20butterfly%20optimization%20algorithm%20and%20harmony_ABS.pdf |
Similar Items
Fuzzy modelling using butterfly optimization algorithm for
phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2020)
by: Noor Syahirah, Nordin, et al.
Published: (2020)
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021)
by: Noor Syahirah, Nordin, et al.
Published: (2021)
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
by: Noor Syahirah, Nordin
Published: (2022)
by: Noor Syahirah, Nordin
Published: (2022)
Fuzzy modelling using firefly algorithm for phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2019)
by: Noor Syahirah, Nordin, et al.
Published: (2019)
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020)
by: Siti Hawa, Apandi, et al.
Published: (2020)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
Comparative performance of machine learning methods for classification on phishing attack detection
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020)
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020)
Hybrid harmony search algorithm for continuous optimization problems
by: Ala’a Atallah, Hamad Alomoush
Published: (2020)
by: Ala’a Atallah, Hamad Alomoush
Published: (2020)
Hybrid harmony search algorithm integrating differential evolution and lévy flight for engineering optimization
by: Qin, Feng, et al.
Published: (2025)
by: Qin, Feng, et al.
Published: (2025)
Harmony search-based fuzzy clustering algorithms for image segmentation.
by: Alia, Osama Moh’d Radi
Published: (2011)
by: Alia, Osama Moh’d Radi
Published: (2011)
PhishGuard: Machine learning-powered phishing URL detection
by: Murad, Saydul Akbar, et al.
Published: (2023)
by: Murad, Saydul Akbar, et al.
Published: (2023)
Pressure vessel design simulation using hybrid harmony search algorithm
by: Alaa A., Alomoush, et al.
Published: (2019)
by: Alaa A., Alomoush, et al.
Published: (2019)
Hybrid Harmony Search Algorithm with Grey Wolf Optimizer and Modified Opposition-based Learning
by: Alomoush, Alaa A., et al.
Published: (2019)
by: Alomoush, Alaa A., et al.
Published: (2019)
Review of the machine learning methods in the classification of phishing attack
by: Jupin, John Arthur, et al.
Published: (2019)
by: Jupin, John Arthur, et al.
Published: (2019)
Hyperdize Jaya Algorithm for Harmony Search Algorithm's Parameters Selection
by: Alaa A., Al-Omoush, et al.
Published: (2016)
by: Alaa A., Al-Omoush, et al.
Published: (2016)
Parameter estimation of essential amino acids in Arabidopsis thaliana using hybrid of bees algorithm and harmony search
by: Aw, Mei Yee, et al.
Published: (2019)
by: Aw, Mei Yee, et al.
Published: (2019)
Cloud Resource Management Framework Using Monarch Butterfly Harmony Search And Case Based Reasoning
by: Ahmed Mohamed Ghetas, Mohamed Rezk
Published: (2017)
by: Ahmed Mohamed Ghetas, Mohamed Rezk
Published: (2017)
Phishing website detection
by: Nur Sholihah, Zaini
Published: (2018)
by: Nur Sholihah, Zaini
Published: (2018)
Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection
by: Muhammad Arif, Mohamad, et al.
Published: (2024)
by: Muhammad Arif, Mohamad, et al.
Published: (2024)
An enhanced model to increase awareness on phishing attacks for vocational students
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
Comparative analysis of machine learning classifiers for phishing detection
by: Mohd Faizal, Ab Razak, et al.
Published: (2022)
by: Mohd Faizal, Ab Razak, et al.
Published: (2022)
Phishing Website Detection using Machine Learning
by: Padmini, Y, et al.
Published: (2024)
by: Padmini, Y, et al.
Published: (2024)
Comprehensive review of the development of the harmony search algorithm and its applications
by: Al-Omoush, A.A., et al.
Published: (2019)
by: Al-Omoush, A.A., et al.
Published: (2019)
An Enhanced Model for Increasing Awareness of Vocational Students Against Phishing Attacks
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
Enhancing the Awareness Level on Phishing Attacks Among Malaysians: Analysis and Recommendations
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2018)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2018)
Feature-based phishing detection technique
by: Xin, Mei Choo, et al.
Published: (2016)
by: Xin, Mei Choo, et al.
Published: (2016)
Enhancing three variants of harmony search algorithm for continuous optimization problems
by: Alomoush, Alaa A., et al.
Published: (2021)
by: Alomoush, Alaa A., et al.
Published: (2021)
Machine learning technique for phishing website detection
by: Nurul Amira, Mohd Zin, et al.
by: Nurul Amira, Mohd Zin, et al.
Pairwise test suite generator tool based on harmony search algorithm (HS-PTSGT)
by: Lai, Yi Xiang
Published: (2014)
by: Lai, Yi Xiang
Published: (2014)
Harmony Search-Based Fuzzy
Clustering Algorithms For Image
Segmentation
by: Alia, Osama Moh’d Radi
Published: (2011)
by: Alia, Osama Moh’d Radi
Published: (2011)
A harmony search algorithm for university course timetabli
by: Al-Betar, Mohammed Azmi, et al.
Published: (2012)
by: Al-Betar, Mohammed Azmi, et al.
Published: (2012)
Harmony search algorithms for ab initio protein tertiary structure prediction.
by: Rub, Mohammed Said Saleh Abual
Published: (2011)
by: Rub, Mohammed Said Saleh Abual
Published: (2011)
Phishing Website Detection Technique Using Machine Learning
by: Nurul Amira, Mohd Zin
Published: (2022)
by: Nurul Amira, Mohd Zin
Published: (2022)
Email Phishing Detection Model using CNN Model
by: Gurumurthy, M., et al.
Published: (2024)
by: Gurumurthy, M., et al.
Published: (2024)
Harmony Search-Based Cluster Initialization For Fuzzy C-Means Segmentation Of MR Images.
by: Moh’d Alia, Osama, et al.
Published: (2009)
by: Moh’d Alia, Osama, et al.
Published: (2009)
Real time detection of phishing websites
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
Cellular Harmony Search for Optimization Problems
by: Al-Betar, Mohammed Azmi, et al.
Published: (2013)
by: Al-Betar, Mohammed Azmi, et al.
Published: (2013)
Adapting And Hybrid Ising Harmony Search With Metaheuristic Components For University Course Timetabling
by: Al-Betar, Mohammed Azmi
Published: (2010)
by: Al-Betar, Mohammed Azmi
Published: (2010)
Harmony Search-Based Hyper-Heuristic For Scheduling Problems
by: Anwar, Khairul
Published: (2018)
by: Anwar, Khairul
Published: (2018)
Similar Items
-
Fuzzy modelling using butterfly optimization algorithm for
phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2020) -
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021) -
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
by: Noor Syahirah, Nordin
Published: (2022) -
Fuzzy modelling using firefly algorithm for phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2019) -
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020)