Research Article
A Case-Based Reasoning Approach for Automatic Adaptation of Classifiers in Mobile Phishing Detection
Table 8
Runtime comparison of 5 scenarios on 9 classification approaches (in seconds).
| Case ID | J48 | DT | IBK | LR | NB | SVM | AVG | MAJ | MAX |
| 01 | 4.43 | 18.63 | 0.01 | 1.93 | 0.64 | 3.01 | 29.87 | 29.52 | 26.16 | 02 | 4.54 | 31.80 | 0.0001 | 2.57 | 0.66 | 39.24 | 76.20 | 76.35 | 75.90 | 03 | 9.44 | 58.80 | 0.01 | 7.22 | 1.14 | 18.94 | 95.18 | 96.09 | 97.41 | 04 | 12.09 | 148.32 | 0.0001 | 5.28 | 1.39 | 6.25 | 174.4 | 174.6 | 174.61 | 05 | 17.09 | 167.14 | 0.01 | 7.86 | 1.93 | 3.61 | 203.62 | 205.50 | 203.51 |
|
|