Now showing items 1-4 of 4

    • Combinational feature selection approach for network intrusion detection system 

      Garg, T.; Kumar, Y. (Institute of Electrical and Electronics Engineers Inc., 2015)
      In the era of digital world, the computer networks are receiving multidimensional advancements. Due to these advancements more and more services are available for malicious exploitation. New vulnerabilities are found from ...
    • A comparative analysis and awareness survey of phishing detection tools 

      Sharma, H.; Meenakshi, E.; Bhatia, S.K. (Institute of Electrical and Electronics Engineers Inc., 2018)
      Phishing is a kind of attack in which phishers use spoofed emails and malicious websites to steal personal information of people. Nowadays various tools are freely available to detect phishing and other web-based scams, ...
    • Detection of malicious URLs in big data using RIPPER algorithm 

      Thakur, S.; Meenakshi, E.; Priya, A. (Institute of Electrical and Electronics Engineers Inc., 2018)
      'Big Data' is the term that describes a large amount of datasets. Datasets like web logs, call records, medical records, military surveillance, photography archives, etc. are often so large and complex, and as the data is ...
    • Detection of phishing websites using C4.5 data mining algorithm 

      Priya, A.; Meenakshi, E. (Institute of Electrical and Electronics Engineers Inc., 2018)
      Phishing sites are fake sites that are made by deceptive persons which are copy of genuine sites. These websites look like an official website of any company such as bank, institute, etc. The main aim of phishing is that ...