{"id":"https://openalex.org/W2513044562","doi":"https://doi.org/10.1145/2905055.2905064","title":"Enhancement of the Classification Performance of Least Square Support Vector Machine using Simple Particle Swarm Optimization for Phishing Dataset","display_name":"Enhancement of the Classification Performance of Least Square Support Vector Machine using Simple Particle Swarm Optimization for Phishing Dataset","publication_year":2016,"publication_date":"2016-03-04","ids":{"openalex":"https://openalex.org/W2513044562","doi":"https://doi.org/10.1145/2905055.2905064","mag":"2513044562"},"language":"en","primary_location":{"id":"doi:10.1145/2905055.2905064","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905064","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059697210","display_name":"Sheetal Bairwa","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sheetal Bairwa","raw_affiliation_strings":["Govt. Engineering College, Ajmer"],"affiliations":[{"raw_affiliation_string":"Govt. Engineering College, Ajmer","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016619024","display_name":"Jyoti Gajrani","orcid":"https://orcid.org/0000-0002-8223-5975"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jyoti Gajrani","raw_affiliation_strings":["Govt. Engineering College, Ajmer"],"affiliations":[{"raw_affiliation_string":"Govt. Engineering College, Ajmer","institution_ids":[]}]},{"author_position":"last","author":{"id":null,"display_name":"Satyanarayan Tazi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Satyanarayan Tazi","raw_affiliation_strings":["Govt. Engineering College, Ajmer"],"affiliations":[{"raw_affiliation_string":"Govt. Engineering College, Ajmer","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5059697210"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11184107,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11550","display_name":"Text and Document Classification Technologies","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.7989304065704346},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.7548359036445618},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7494213581085205},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5760065913200378},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.5716351270675659},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5403686761856079},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5229799747467041},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.5170981884002686},{"id":"https://openalex.org/keywords/parametric-statistics","display_name":"Parametric statistics","score":0.5024528503417969},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.4359493553638458},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.32271066308021545},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.13132020831108093},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09501993656158447}],"concepts":[{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.7989304065704346},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.7548359036445618},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7494213581085205},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5760065913200378},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.5716351270675659},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5403686761856079},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5229799747467041},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.5170981884002686},{"id":"https://openalex.org/C117251300","wikidata":"https://www.wikidata.org/wiki/Q1849855","display_name":"Parametric statistics","level":2,"score":0.5024528503417969},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.4359493553638458},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32271066308021545},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.13132020831108093},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09501993656158447},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2905055.2905064","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905064","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1562024601","https://openalex.org/W1997564913","https://openalex.org/W2023973750","https://openalex.org/W2027558733","https://openalex.org/W2058798992","https://openalex.org/W2117285489","https://openalex.org/W2139565456","https://openalex.org/W2144577378","https://openalex.org/W2148614760","https://openalex.org/W2556107930","https://openalex.org/W3104235943","https://openalex.org/W6656508505","https://openalex.org/W6681149309"],"related_works":["https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W4396966040","https://openalex.org/W2305322260","https://openalex.org/W3139248031","https://openalex.org/W3042334625","https://openalex.org/W4200017362","https://openalex.org/W4388020458"],"abstract_inverted_index":{"Data":[0],"mining":[1],"and":[2,163],"machine":[3,41,45],"learning":[4,46],"concepts":[5,22],"play":[6],"a":[7,24,44,117],"vital":[8],"role":[9],"in":[10,57,73],"dealing":[11],"with":[12,109],"large":[13],"number":[14],"of":[15,27,69,92,96,131,149,171],"datasets.":[16],"Various":[17],"algorithms":[18],"embedded":[19],"within":[20],"these":[21],"provide":[23],"wide":[25],"array":[26],"mechanisms":[28],"to":[29,49,59,101,125],"classify":[30,50],"the":[31,51,62,70,90,93,127,146,150,160,169],"data":[32],"into":[33],"its":[34,74,83,139],"specific":[35],"classes.":[36],"Least":[37],"square":[38],"support":[39],"vector":[40],"(LS-SVM)":[42],"is":[43,106,123,157],"approach":[47,122],"used":[48],"data.":[52],"Although":[53],"it":[54,78,135],"works":[55],"better":[56],"comparison":[58],"other":[60,172],"algorithms,":[61],"various":[63],"changes":[64],"sustained":[65],"on":[66,89,159],"each":[67],"run":[68],"program":[71,151],"execution":[72,148],"parametric":[75,129],"values":[76,130],"makes":[77],"quite":[79],"resilient":[80],"enough":[81],"towards":[82],"performance.":[84],"Hence,":[85],"this":[86],"paper":[87],"focuses":[88],"enhancement":[91],"performance":[94,141],"level":[95],"traditional":[97,104],"LS-SVM.":[98],"In":[99],"order":[100],"do":[102],"so,":[103],"LS-SVM":[105,132],"integrated":[107],"together":[108],"simplified":[110],"particle":[111],"swarm":[112,118],"optimization":[113,121],"technique":[114],"(PSO).":[115],"PSO,":[116],"intelligence":[119],"based,":[120],"exploited":[124,158],"optimize":[126],"kernel":[128],"so":[133],"that":[134],"not":[136],"only":[137],"improves":[138],"classification":[140],"but":[142],"significantly":[143],"also":[144],"improve":[145],"time":[147],"being":[152],"run.":[153],"The":[154],"proposed":[155],"method":[156],"phishing":[161],"dataset":[162],"experimental":[164],"results":[165,170],"are":[166],"evaluated":[167],"against":[168],"algorithms.":[173]},"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2025-10-10T00:00:00"}
