O'Reilly logo

A Machine-Learning Approach to Phishing Detection and Defense by E. Fazeldehkordi, O.A. Akanbi, Iraj Sadegh Amiri

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3

Research Methodology

Abstract

The chapter discusses the research methodology as well as the different classifiers used in the study. First, a brief introduction of the chapter is important; this introduces the classifiers used as well as their description; the aim of the chapter is also discussed. Second, a quick overview of the research framework is discussed followed by an operational flow diagram. Furthermore, a breakdown of the framework showing how the processes are linked and the outputs expected from each stage of the research are presented. However, the research framework is more of a diagrammatic illustration of our objectives and it can as well be seen as a blueprint of the study. Third, a descriptive table showing the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required