Phishing Detection In Selected Feature Using Modified SVM-PSO
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2016, Vol 5, Issue 4
Abstract
The sensitive information such as passwords, credit card number, account details, email information and credential of the external users robbed by threats such kind of threat is called phishing. So many softwareand technique has been developed to address this problem. In this work, we reduce the features to identify the suspecting online users using data mining method support vector machine (SVM) and particle swarm optimization. The experimental result analysis is done in Visual C#.net and framework 4.5 used, the purpose of using C#.Net technology is to easily interact with web related data, because without internet interaction the experimental test is not possible.
Authors and Affiliations
Nirmala Suryavanshi, Anurag Jain
A Review on Password Cracking Strategies
As the word itself implies, Personal Account Security S ystem WORD (PASS WORD) is a word or string of characters used for user authentication to prove identity. But now passwords are going cracked to gain unauthoriz...
A Trusted Identity Acknowledgement Protocol for Security Enhancement in MANET
Identifying trusted node for secure communication is a very important point in mobile adhoc network. It makes a node to compromise for a service and causes uncertainty of node behaviour. Computing a node trust and ma...
EVS: A Cloud Services Information Security and Privacy Eligibility and Verification System
In recent years, cloud computing services have evolved as a new paradigm for delivering computing resources thatare dynamic and customizable, and providehigh performance. Many organizations are migrating their inform...
Multichannel Contact Center Performance Analysis
The Contact Centers play important role in customer interactions. They provide information to differentiate company products and services and build loyalty relations with customers. The Contact Center is the central...
PCCP:Technique For Online Authentication Presuming Attacks
Attacks on the password in remote login services is increasing day by day. Providing convenient login for legitimate users from prevention such attack is became a challenging problem. From the beginning Automated Tur...