Predicting phishing websites based on self-structuring neural network RM Mohammad, F Thabtah, L McCluskey Neural Computing and Applications 25, 443-458, 2014 | 398 | 2014 |
An assessment of features related to phishing websites using an automated technique RM Mohammad, F Thabtah, L McCluskey 2012 international conference for internet technology and secured …, 2012 | 304 | 2012 |
Intelligent rule‐based phishing websites classification RM Mohammad, F Thabtah, L McCluskey IET Information Security 8 (3), 153-160, 2014 | 295 | 2014 |
Tutorial and critical analysis of phishing websites methods RM Mohammad, F Thabtah, L McCluskey Computer Science Review 17, 1-24, 2015 | 194 | 2015 |
The 2014 international planning competition: Progress and trends M Vallati, L Chrpa, M Grześ, TL McCluskey, M Roberts, S Sanner Ai Magazine 36 (3), 90-98, 2015 | 180 | 2015 |
Acquiring planning domain models using LOCM SN Cresswell, TL McCluskey, MM West The Knowledge Engineering Review 28 (2), 195-213, 2013 | 173 | 2013 |
Engineering and compiling planning domain models to promote validity and efficiency TL McCluskey, JM Porteous Artificial Intelligence 95 (1), 1-65, 1997 | 142 | 1997 |
Planning domain definition using GIPO RM Simpson, DE Kitchin, TL McCluskey The Knowledge Engineering Review 22 (2), 117-134, 2007 | 115 | 2007 |
Efficient macroscopic urban traffic models for reducing congestion: A PDDL+ planning approach M Vallati, D Magazzeni, B De Schutter, L Chrpa, T McCluskey Proceedings of the AAAI conference on artificial intelligence 30 (1), 2016 | 110 | 2016 |
Phishing websites features RM Mohammad, F Thabtah, L McCluskey School of Computing and Engineering, University of Huddersfield 138, 2015 | 90 | 2015 |
Autonomic transport management systems—enabler for smart cities, personalized medicine, participation and industry grid/industry 4.0 J Schlingensiepen, F Nemtanu, R Mehmood, L McCluskey Intelligent transportation systems–problems and perspectives, 3-35, 2016 | 88 | 2016 |
Acquisition of object-centred domain models from planning examples S Cresswell, T McCluskey, M West Proceedings of the International Conference on Automated Planning and …, 2009 | 84 | 2009 |
An Interactive Method for Inducing Operator Descriptions. TL McCluskey, NE Richardson, RM Simpson AIPS, 121-130, 2002 | 77 | 2002 |
GIPO II: HTN Planning in a Tool-supported Knowledge Engineering Environment. TL McCluskey, D Liu, RM Simpson ICAPS 3, 92-101, 2003 | 74 | 2003 |
Predicting phishing websites using neural network trained with back-propagation R Mohammad, TL McCluskey, F Thabtah World Congress in Computer Science, Computer Engineering, and Applied Computing, 2013 | 72 | 2013 |
Embedding automated planning within urban traffic management operations T McCluskey, M Vallati Proceedings of the International Conference on Automated Planning and …, 2017 | 63 | 2017 |
Phishing websites dataset R Mohammad, F Thabtah, TL McCluskey University of Huddersfield, 2015 | 60 | 2015 |
The OCL language manual D Liu, TL McCluskey Version 1.2. Technical report, Department of Computing and Mathematical …, 2000 | 49 | 2000 |
A requirements capture method and its use in an air traffic control application TL McCluskey, JM Porteous, Y Naik, CN Taylor, S Jones Software: Practice and Experience 25 (1), 47-71, 1995 | 47 | 1995 |
Engineering knowledge for automated planning: Towards a notion of quality TL McCluskey, TS Vaquero, M Vallati Proceedings of the 9th Knowledge Capture Conference, 1-8, 2017 | 46 | 2017 |