Search alternatives:
bayesian optimization » based optimization (Expand Search)
work optimization » wolf optimization (Expand Search), swarm optimization (Expand Search), dose optimization (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
less based » lens based (Expand Search), lemos based (Expand Search), degs based (Expand Search)
based work » based network (Expand Search)
bayesian optimization » based optimization (Expand Search)
work optimization » wolf optimization (Expand Search), swarm optimization (Expand Search), dose optimization (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
less based » lens based (Expand Search), lemos based (Expand Search), degs based (Expand Search)
based work » based network (Expand Search)
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
-
17
-
18
-
19
-
20
Table_1_Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning.DOCX
Published 2024“…Subsequently, data cleansing, curation, and dimensionality reduction were performed to remove outliers, handle missing values, and exclude less predictive features. To identify the optimal model, the study evaluated and compared 15 SML algorithms arising from different machine learning (ML) families, including Bayesian, nearest-neighbors, decision trees, neural networks, quadratic discriminant analysis, logistic regression, bagging, boosting, random forests, and ensembles. …”