Research Article

Cluster-Based Antiphishing (CAP) Model for Smart Phones

Table 3

Techniques’ descriptions.

A1DEAverage one dependency estimator

NBNaïve Bayes
MLPMultilayer perceptron
QDAQualitative Descriptive Analysis
SVMSupport Vector Machine
WiSARDWiSARD
CHIRPCOMPOSITE HYPERCUBE ON ITERATED RANDOM PROJECTION
DecisionTableDecisionTable
DTNBDecisionTable\Naïve Bayes
RidorRidor
J48Decision Tree