References
- He H, Garcia EA. Learning from imbalanced data. IEEE Trans Knowledge Data Eng. 2009 Sep;21(9):1263–1284. doi: 10.1109/TKDE.2008.239
- Elrahman SMA, Abraham A. A review of class imbalance problem. Int J Innov Comput Inf Control. 2013;1:332-340, ISSN 2160–2174. http://www.softcomputing.net/jnic2.pdf
- Guan H, Zhang Y, Xian M, et al. SMOTE-WENN: Solving class imbalance and small sample problems by oversampling and distance scaling. Appl Intell Springer. 2021;51(3):1394–1409. https://dl.acm.org/doi/abs/10.1007/s10489-020-01852-8
- Provost F. Machine learning from imbalanced data sets 101. AAAI Technical Report, WS-00-05, 2000. https://vvvvw.aaai.org/Papers/Workshops/2000/WS-00-05/WS00-05-001.pdf
- Letteri I, Cecco AD, Dyoub A, et al. Penna “A novel resampling technique for imbalanced dataset optimizationDepartment of Information Engineering, Computer Science and MathematicsUniversity of L’AquilaItaly30 Dec 2020 https://arxiv.org/pdf/2012.15231.pdf
- Chawla NV, Japkowicz N, Kolcz A. Editorial: Special issue on learning from imbalanced data sets. ACM SIGKDD Explorations Newsl. 2004 June;6(1):1–6. doi:10.1145/1007730.1007733.
- Chawla NV, Bowyer KW, Hall LO, et al. SMOTE: Synthetic minority over-sampling technique. J Artif Intell Res. 2002;16:321–357. https://dl.acm.org/doi/10.1145/1007730.1007735
- Wilson DL. Asymptotic properties of nearest neighbor rules using edited data. IEEE Trans Syst Man Cybern. 1972 July;SMC-2(3):408–421. doi:10.1109/TSMC.1972.4309137.
- Batista GEAPA, Prati RC, Monard MC. A study of the behavior of several methods for balancing machine learning training data. ACM SIGKDD Explorations Newsl. 2004;6(1):20–29. https://www.frontiersin.org/articles/10.3389/fcomp.2021.563060/full
- Mohammad RM, Thabtah F, McCluskey L. “Phishing websites features,” school of computing and engineering. Index of/ml/machine. Index of/ml/machinelearningdatabases/00327 (uci.edu): University of Huddersfield, 2015. https://eprints.hud.ac.uk/id/eprint/24330/6/MohammadPhishing14July2015.pdf
- Basit A, Zafar M, Liu X, et al. A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun Syst Springer. 2021;76(1):139–154. http://www.softcomputing.net/jnic2.pdf
- Alabdan R. Phishing attacks survey: Types, vectors, and technical approaches. Future Internet. 2020;12(10):168. doi: 10.3390/fi12100168
- Alkhalil Z, Hewage C, Nawaf L, et al. Phishing attacks: A recent comprehensive study and a new anatomy. Front Comput Sci. 30 September 2020;3. https://www.frontiersin.org/articles/10.3389/fcomp.2021.563060/full
- Johnson JM, M T. Khoshgoftaar. Survey on deep learning with class Imbalance. J Big Data. 6(27):2019. doi: 10.1186/s40537-019-0192-5
- Kubat M, Matwin S, “Addressing the curse of imbalanced training sets: one-sided selection,” In Proc. of 14th International Conference on Machine Learning (ICML), vol. 97, pp. 179–186, 1997. https://www.semanticscholar.org/paper/Addressing-the-Curse-of-Imbalanced-Training-Sets%3A-Kub%C3%A1t-Matwin/ebc3914181d76c817f0e35f788b7c4c0f80abb07
- Seiffert C, Khoshgoftaar TM, Hulse JV. Hybrid Sampling for imbalanced data. IEEE, July 13-15, 978-1-4244-2660-7/08/$25.00, 2008. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4583030
- Elkan C. The foundations of cost-sensitive learning. Proc. Int’l Joint Conf. Artificial Intelligence, pp. 973–978, 2001. https://dl.acm.org/doi/10.5555/1642194.1642224
- Provost F, Fawcett T. Robust classification for imprecise environmentsMach Learn42203–2312001. doi:10.1023/A:1007601015854
- Lv M, Ren Y, Chen Y, “Research on imbalanced data based on SMOTE-AdaBoost algorithm,” IEEE, 978-1-7281-3584–7/19, 2019. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9094859
- Branco P, Torgo L, Ribeiro RP. A survey of predictive modelling under imbalanced distributions. 2015. https://dl.acm.org/doi/pdf/10.1145/2907070.
- Sagnik YA, Kar AK. Phishing website detection using support vector machines and nature-inspired optimization algorithms. Telecommun Syst. 2021;76(1):17–32. doi: 10.1007/s11235-020-00739-w
- Alsariera YA, Adeyemo VE, Balogun AO et al. AI meta-learners and extra-trees algorithm for the detection of phishing websites IEEE Access 8Aug 2020. 142532–142542 doi:10.1109/ACCESS.2020.3013699
- Bikku T, Nikitha M, Vajja A, et al. Optimized Machine Learning Algorithm to classify Phishing Websites. International Conference on Electronics and Renewable Systems (ICEARS), IEEE, 2022. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9752223
- Sindhu S, Patil SP, Sreevalsan A, et al. “Phishing detection using random forest, SVM and Neural Network with Backpropagation,” IEEE, 978-1-7281-7213-2/20/$31.00, 2020. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9277256
- Aminu AA, Abdulkarim A, Aliyu AY, et al. Detection of phishing websites using random forest and XGBOOST. Int j pure appl sci ISSN. 2019 Sept;2(3):2635–3393. http://www.smrpi.com/images/journals/IJPAS/20.pdf
- Tabassum N, Neha FF, Hossain MS, et al. A Hybrid machine learning based phishing website detection technique through dimensionality reduction. IEEE Inter. Black Sea Conference on Communications and Networking (BlackSeaCom), 2021. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9527806
- Prayogo RD, Karimah SA, Optimization of phishing website classification based on synthetic minority oversampling technique and feature selection. IEEE, 978-1-7281-9098-3/20, 2020. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9255562
- Prince MSM, Hasan A, Shah FM, “A New Ensemble Model for Phishing Detection Based on Hybrid Cumulative Feature Selection,” 11th IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), 987-1-6654-0038-2/21, 2021. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9431782
- Ahmed DS, Hussein KQ, Allah HAAA. Phishing websites detection model based on decision tree algorithm and best feature selection method. Turkish Int J Comput Math Educ. 2022;13(1):100–107. https://www.proquest.com/docview/2622301704?parentSessionId=H4gOJBurH0wFBb3SrE%2BFGmwr14W%2BiXN8Cp3DGYIUHPM%3D
- Pristyanto Y, Dahlan A, “Hybrid resampling for imbalanced class handling on web phishing classification dataset,” 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), IEEE, 2019. https://ieeexplore.ieee.org/document/9003803
- Mohammad RM, Thabtah F, McCluskey L. Phishing Websites Features. 2015. https://core.ac.uk/reader/30732240.
- Mohammad RM, Thabtah F, McCluskey L, An assessment of features related to phishing websites using an automated technique. International Conference for Internet Technology and Secured Transactions (ICITST), IEEE, London, UK, pp. 492–497, ISBN 978-1-4673-5325-0, 2012. http://eprints.hud.ac.uk/id/eprint/16229/
- Thai-Nghe N, Ganter Z, Schmidt-Thieme L. Cost-sensitive learning methods for imbalanced data. IEEE; 2010. 978-1-4244-8126-2/10: https://www.ismll.uni-hildesheim.de/pub/pdfs/Nguyen_et_al_IJCNN2010_CSL.pdf
- Abdelhamid N, UCI machine learning repository: phishing website dataset, 2016. https://archive.ics.uci.edu/ml/datasets/Website%2BPhishing
- Dua D, Graff C. UCI machine learning repositoryIrvine, CAUniversity of CaliforniaSchool of information and computer science, 2019 uci machine learning repository: phishing websites data set https://archive.ics.uci.edu/ml
- Tan CL. Phishing dataset for machine learning: Feature Evaluation. 2018. R. M. Mohammad, F. Thabtah, and L. McCluskey, 2015. UCI Machine Learning Repository: Phishing Websites Data Set. https://data.mendeley.com/datasets/h3cgnj8hft/1
- Lokesh GH, BoreGowda G. Phishing website detection based on effective machine learning approach. Taylor & Francis Group J Cyber Secur Technol. 2021;5(1):1–14. doi: 10.1080/23742917.2020.1813396
- Shrivastava V, Satish S, Kamble, et al. Adalward: a deep-learning framework for multi-class malicious webpage detection. J Cyber Secur Technol. 2020;4(3):153–195. https://www.tandfonline.com/doi/full/10.1080/23742917.2020.1714195
- Tinubu CO, Falana OJ, Oluwumi EO, et al. PHISHGEM: a mobile game-based learning for phishing awareness. J Cyber Secur Technol. Taylor & Francis Group doi:10.1080/23742917.2023.2167276, Feb 2023.
- Onashoga AS, Ojo OE, Soyombo OO. Securix: a 3D game-based learning approach for phishing attack awareness. Informa UK Limited, Taylor & Francis Group J Cyber Secur Technol. 2019;3(2):108–124. doi: 10.1080/23742917.2019.1624011
- Arachchilage NAG, Love S. ” Security awareness of computer users: a phishing threat avoidance perspective”, computers in human behavior, science direct. Elsevier. 2014, Vol. 38pp. 304–312 doi:10.1016/j.chb.2014.05.046
- Srivastava J, Sharan A” Phishing website detection based on hybrid resampling kmeanssmotencr and cost-sensitive classification”. International Conference on Communications and Cyber-Physical Engineering 2022, Book Chapter in “Advances in Cognitive Sciences and Communications”, Springer Nature, Singapore, 725–733, 2023. doi:10.1007/978-981-19-8086-2_69