Research Article
Phishing Target Identification Based on Neural Networks Using Category Features and Images
Table 3
The performance of different features’ sets on LightGBM.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
represents URL features, represents host features, represents web resource features, and represents OCR features. The bold values represent the best values of the evaluation metrics. |