Fig. 16From: Intelligent phishing url detection using association rule miningComparision of computational time of algorithmsBack to article page