
Detecting Forged E-Mail using Data Mining Techniques
Oct 1, 2019 · This research aims to identify the phishing E-mails using classification techniques with a better accuracy. The technique proposed in this research work to classify forged E-mails...
In the context of email mining, spam detection is to identify unsolicited bulk emails using data mining techniques. In general, based on the information mainly used, spam detection methods …
Detecting Forged E-Mail using Data Mining Techniques
Oct 30, 2019 · A novel approach to overcome the difficulty and complexity in detecting and predicting e-banking phishing website using an intelligent resilient and effective model that is …
Email phishing detection and prevention by using data mining techniques ...
In this work, a phishing detection method is proposed by using machine learning and data mining techniques. Success rate of %89 has been achieved against phishing attacks coming from …
A Prediction Model to Prevent Phishing Attacks on E-Mails Using Data ...
The present study aims to design and implement a prediction model in order to detect social engineering attacks such as phishing in infected e-mails using data mining techniques.
Email Worm Detection Using Data Mining - IGI Global
This chapter applies data mining techniques to detect email worms. Email messages contain a number of different features such as the total number of words in message body/subject, …
Detecting Email Forgery using Random Forests and Naïve Bayes …
As emails communications have no consistent authentication procedure to ensure the authenticity, we present an investigation analysis approach for detecting forged emails based …
In This paper, we have discussed about four different algorithms used for detection of phishing E-mails using Data Mining. Also, we have analysing the methodologies and implement the …
The experiment was executed using WEKA Tool on a dataset of 4800 Email, 2400 phishing emails and 2400 legitimate emails represented the 47 features of the email structure.
Key Words: Phishing attack, Fake E-mails, data mining, anti-phishing techniques.
- Some results have been removed