Fig. 17From: Intelligent phishing url detection using association rule miningNumber of effective rules of algorithms in various instancesBack to article page