Review of Various Methods for Phishing Detection
Journal Title: EAI Endorsed Transactions on Energy Web - Year 2018, Vol 5, Issue 20
Abstract
In this modern world where the technology has spread rapidly and the inception of cell phones, computers and also the rate at which internet is being used has increased in all fields both commercial, financial and also individuals. The above said inception is a boon but the users are facing dangerous challenges. Hence phishing and information pilfering which are done through spams and deceptive emails. This kind of spams and deceptive emails could lead to great losses for institutions like financial and similar ones. It is understood that in the beginning it is very difficult to judge or trace the modesoprandi of these hackers. To ascertain this cryptic methods of phishing attacks can be effectively done only by developing a particular software thereby safe guard the users. To pick out and detect the operation methods of hackers, the researcher uses the Data Mining process where a number of datamining tools, which analysis the data are used. This learning, basically is Data Miming process and the informations are taken out through different outlets and sources.
Authors and Affiliations
R. Sakunthala jenni, S. Shankar
EDUCATION QUALITY EVALUATION OF ELECTRIC POWER ENGINEERING SPECIALTIES STUDENTS IN TECHNICAL UNIVERSITY OF RUSSIA WITH THE USE OF INTERNET TECHNOLOGIES
A fuzzy model for the education quality evaluation of electric power engineering specialties students with the use of modern Internet technologies is described, which allows to take into account the different compatibili...
Model to estimate the salt and pepper noise density level on gray-scale digital image
In this research paper, we proposed a probabilistic analysis to find the relationship between entropy of image and salt & pepper noise density. For this estimation, we have employed entropy inspection of spatial domain te...
Review of Various Methods for Phishing Detection
In this modern world where the technology has spread rapidly and the inception of cell phones, computers and also the rate at which internet is being used has increased in all fields both commercial, financial and also i...
Demand Response an Alternative Solution to Prevent Load Shedding Triggering
This paper investigates an alternative solution to prevent Load Shedding (LS) triggering during underfrequency and proposes a new technique to restore the frequency during emergency events. Demand response (DR) is consid...
Comparative Analysis of Machine Learning Algorithms on IVR data
We aim to classify IVR data (Interactive Voice Response) and provide a detailed summary of the methods and techniques we employed to create a classifier model of reasonably high accuracy. This model is built to process l...