https://gphjournal.org/index.php/cse/issue/feed GPH - International Journal Of Computer Science and Engineering 2023-06-20T09:19:55+00:00 Dr. EKEKE, JOHN NDUBUEZE drekekejohn@gmail.com Open Journal Systems <p style="font-family: Comic Sans MS;">Subjects covered in Computer Science and Engineering include: Computer Science;→ Scientific Computing; Wireless Networking; Network Modelling; Computational Science &amp; Engineering; Theoretical Computer Science; Biosystems Engineering; Machine Learning; Systems Biology &amp; Bioinformatics; Biostatistics; Data Mining; Data Analysis; Internet Computing &amp; Web Services; Information System Engineering; Quantum Computing; Nano Computing; Soft Computing; Artificial Intelligence; Digital Signal Processing, Cloud Computing; Robotics; Computer Graphics; Information Science; Medical Image Computing; Natural language Processing; Evolutionary Computation.</p> https://gphjournal.org/index.php/cse/article/view/888 CLASSIFICATION OF PHISHING ATTACKS IN SOCIAL MEDIA USING ASSOCIATIVE RULE MINING AUGMENTED WITH FIREFLY ALGORITHM 2023-06-20T09:19:55+00:00 HAMMED, Mudasiru noreplygphjournal@gmail.com Jumoke Soyemi jumoke.soyemi@federalpolyilaro.edu.ng <p>Social media has significantly grown as a preferred medium of communication for individuals and groups. It is also a tool for disseminating information to the public. Social media offers several advantages, most especially contacting millions of people at the same time. Social media attacks such as phishing evolved as a result of messaging and disseminating capabilities of social media network sites. This challenge of continuous attacks has attracted the attention of many researchers to propose different techniques to detect and classify both phishing attacks and legitimate messages. Studies in the literature revealed that some of the models proposed for phishing attacks may not be perfect to stop adversaries and, there are still different phishing attacks that hindered the robust nature of social media. This study proposed associative rule mining augmented with the Firefly algorithm which attained a high degree of accuracy in both phishing attack messages and legitimate messages.</p> 2023-06-20T06:47:44+00:00 ##submission.copyrightStatement##