Research Article
A Case-Based Reasoning Approach for Automatic Adaptation of Classifiers in Mobile Phishing Detection
Table 13
Runtime comparison after information gain attribute evaluation feature selection (seconds).
| Case ID | J48 | DT | IBK | LR | NB | SVM | AVG | MAJ | MAX |
| 01 | 4.05 | 20.25 | 0.01 | 1.63 | 0.54 | 3.02 | 29.02 | 27.49 | 27.27 | 02 | 3.86 | 29.43 | 0.001 | 2.35 | 0.56 | 31.96 | 67.63 | 66.52 | 66.40 | 03 | 9.77 | 55.46 | 0.01 | 6.31 | 0.95 | 17.06 | 87.31 | 90.63 | 90.69 | 04 | 6.83 | 87.36 | 0.01 | 2.25 | 0.93 | 6.76 | 102.86 | 93.21 | 93.15 | 05 | 8.42 | 104.52 | 0.001 | 5.37 | 1.21 | 3.95 | 111.80 | 107.53 | 108.07 |
|
|