Review of Various Methods for Phishing Detection
Journal Title: EAI Endorsed Transactions on Energy Web - Year 2018, Vol 5, Issue 20
Abstract
In this modern world where the technology has spread rapidly and the inception of cell phones, computers and also the rate at which internet is being used has increased in all fields both commercial, financial and also individuals. The above said inception is a boon but the users are facing dangerous challenges. Hence phishing and information pilfering which are done through spams and deceptive emails. This kind of spams and deceptive emails could lead to great losses for institutions like financial and similar ones. It is understood that in the beginning it is very difficult to judge or trace the modesoprandi of these hackers. To ascertain this cryptic methods of phishing attacks can be effectively done only by developing a particular software thereby safe guard the users. To pick out and detect the operation methods of hackers, the researcher uses the Data Mining process where a number of datamining tools, which analysis the data are used. This learning, basically is Data Miming process and the informations are taken out through different outlets and sources.
Authors and Affiliations
R. Sakunthala jenni, S. Shankar
Low Energy Clustering in BAN Based on Fuzzy Simulated Evolutionary Computation
A low energy clustering method of body area networks based on fuzzy simulated evolutionary computation is proposed in this paper. To reduce communication energy consumption, we also designed a fuzzy controller to dynamic...
Extracting Academic Subjects Semantic Relations Using Collocations
The paper presents approach to analyze semantic content of academic subjects and its internal relations using statistically-based techniques for collocation extraction from large electronic educational text corpus. It off...
Design and Simulation of Stand-alone PV System for Electronic and Communications Engineering Department Laboratories in Al-Nahrain University
In Iraq the problem of electricity shutdown in the main supply is still exists and the cuts may last for hours. This shutdown causes problems in lectures and students experiments in the colleges because all electrical de...
Frontier and Semifrontier Sets in Intuitionistic Topological Spaces
The notions of frontier and semifrontier in intuitionistic topology have been studied and several of their properties are proved. Many counter examples have been pointed out for the relevant classifications.
Intelligent Control Algorithms in Power Industry
Nowadays more and more attention is given to energy development problems. Modern ways of producing energy are bounded by planet’s resources of coal, natural gas and petroleum, and harmful effects of waste produced by ene...