1. Abdelhamid N, Ayesh A, Thabtah F (2014) Phishing detection based associative classification data mining. Expert Syst Appl 41(13):5948–5959
2. Alcalá-Fdez J, Fernández A, Luengo J, Derrac J, García S, Sánchez L, Herrera AF (2011) KEEL data-mining software tool: data set repository, integration of algorithms and experimental analysis framework. J Mult-Valued Logic Soft Comput 17:255–287
3. An LP, Tong LY (2010) Binary relations as a basis for rule induction in presence of quantitative attributes. JCP 5(3):440–447
4. Bazan JG (1998) A comparison of dynamic and non-dynamic rough set methods for extracting laws from decision tables. Rough Sets Knowl Discov 1:321–365
5. Bertelsen R, Martinez TR (1994) Extending ID3 through discretization of continuous inputs. In: Proceedings of the 7th florida artificial intelligence research symposium, pp 122–125