Now showing items 1-4 of 4

    • A comparative analysis and awareness survey of phishing detection tools 

      Sharma, H.; Meenakshi, E.; Bhatia, S.K. (Institute of Electrical and Electronics Engineers Inc., 2018)
      Phishing is a kind of attack in which phishers use spoofed emails and malicious websites to steal personal information of people. Nowadays various tools are freely available to detect phishing and other web-based scams, ...
    • Comparison of classification techniques for intrusion detection dataset using WEKA 

      Garg, T.; Khurana, S.S. (Institute of Electrical and Electronics Engineers Inc., 2014)
      As the network based applications are growing rapidly, the network security mechanisms require more attention to improve speed and precision. The ever evolving new intrusion types pose a serious threat to network security. ...
    • Detection of malicious URLs in big data using RIPPER algorithm 

      Thakur, S.; Meenakshi, E.; Priya, A. (Institute of Electrical and Electronics Engineers Inc., 2018)
      'Big Data' is the term that describes a large amount of datasets. Datasets like web logs, call records, medical records, military surveillance, photography archives, etc. are often so large and complex, and as the data is ...
    • Detection of phishing websites using C4.5 data mining algorithm 

      Priya, A.; Meenakshi, E. (Institute of Electrical and Electronics Engineers Inc., 2018)
      Phishing sites are fake sites that are made by deceptive persons which are copy of genuine sites. These websites look like an official website of any company such as bank, institute, etc. The main aim of phishing is that ...