Discuss comparison on different datasets used for phishing attacks detection.

Comparison on different datasets used for phishing attacks detection.

Comparison on different datasets used for phishing attacks detection. You may also create a table for helpful way – an example is attached to you in the file called links.
You may also use the links of some references – attached to you in in the file called links-

Finally,  try to use the recent research paper from 2018 and above

Example of compare table as shown in table 1
https://www.scirp.org/journal/paperinformation.aspx?paperid=86682

Some helpful references for the dataset
https://data.mendeley.com/datasets/72ptz43s9v/1
https://www.sciencedirect.com/science/article/pii/S2352340920313202
https://www.researchgate.net/publication/345233023_Datasets_for_phishing_websites_detection
http://www.fcsit.unimas.my/research/legit-phish-set
https://data.mendeley.com/datasets/h3cgnj8hft/1
http://csmining.org/index.php/spam-email-datasets-.html
http://www.csmining.org/index.php/spam-assassin-datasets.html
https://archive.ics.uci.edu/ml/datasets/Phishing+Websites#
http://eprints.hud.ac.uk/24330/
http://ceur-ws.org/Vol-2124/
https://data.mendeley.com/datasets/h3cgnj8hft/1
https://archive.ics.uci.edu/ml/datasets/Website+Phishing
https://d1wqtxts1xzle7.cloudfront.net/63544102/detection-of-phishing-websites-using-an-IJERTV9IS05088820200606-124637-8kwtm0-with-cover-page-v2.pdf?Expires=1624625096&Signature=BKn-LyOPxeBx26W7krgsWqbz6pNGKMeOV8-yW1Hv0I9YmltSIcdhqF97YWYtC4yr~cRKN-sEV09h8WmP3dJN~h4IGk7ik~wxsBKbN~i3sNRdMY3tTigy~LRtTNdLmbRRHrDQNPkV0auJthiHym96finCRW62XMzj4oZVfbGhtkMlbAK23zNM6g-ZZjf3Bcnu6V~KIAQ~rOVCMQ3ryCCkxJYiFC8mL3LU7hs3~~nX63UOAkHM3M2TGoQQuZhbBBUwHzBMaSZ7lbZbOR6lcKRL07XbSSZx5tbnMXNp5qwkvDSacxHCW3HDZ0YC5p1hI-jd9aTvxOjE02Xcw84e4ra9nA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
https://www.researchgate.net/profile/Ali-Adil-Yassin/publication/351691395_An_Efficient_Mechanism_to_Prevent_the_Phishing_Attacks/links/60a4f81d299bf106136a02a2/An-Efficient-Mechanism-to-Prevent-the-Phishing-Attacks.pdf
https://arxiv.org/pdf/2104.01255.pdf
https://link.springer.com/chapter/10.1007/978-3-030-60796-8_26