Algorithm Evaluation for Classification “Phishing Website” Using Several Classification Algorithms
暂无分享,去创建一个
Rizki Wahyudi | Bambang Pilu Hartato | Tri Astuti | Uswatun Hasanah | Hendra Marcos | Rizal Anjas Prasetyo | U. Hasanah | R. Wahyudi | Tri Astuti | Hendra Marcos
[1] Tsegaye Tadesse,et al. Data Mining Attribute Selection Approach for Drought Modeling: A Case Study for Greater Horn of Africa , 2017, ArXiv.
[2] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[3] Bhojane Yogesh,et al. Intelligent rule-based Phishing Websites Classification , 2016 .
[4] อนิรุธ สืบสิงห์,et al. Data Mining Practical Machine Learning Tools and Techniques , 2014 .
[5] Padhraic Smyth,et al. From Data Mining to Knowledge Discovery in Databases , 1996, AI Mag..
[6] Saifudin Amik Bsi Yogyakarta. Naïve Bayes Untuk Mendeteksi Gangguan Jaringan Komputer Dengan Seleksi Atribut Berbasis Korelasi , 2013 .
[7] Efraim Turban,et al. Decision support systems and intellgent systems-7th Ed. jilid 2 = (Sistem pendukung keputusan dan sistem cerdas) / Efraim Turban, Ting-Peng Liang ; Diterjemahkan oleh: Siska Primaningrum , 2005 .
[8] Kusrini,et al. Algoritma Data Mining , 2009 .
[9] Bekti Maryuni Susanto. Naive Bayes Untuk Mendeteksi Gangguan Jaringan Komputer Dengan Seleksi Atribut Berbasis Korelasi , 2013 .
[10] Mamta Madan,et al. The Analytical Comparison of ID3 and C4.5 using WEKA , 2017 .
[11] Suyanto. Data mining untuk klasifikasi dan klasterisasi data , 2017 .