The solution parameters set an upper bound on the fraction of phishing emails and a lower bound on the number of trainings from the legitimate emails used as Support Vector. Most anomaly detection approaches to discovering phishing in spoofed websites focus on identifying abnormal signs that are ...