Search
Now showing items 1-5 of 5
SHED: Spam Ham Email Dataset
(International Journal on Recent and Innovation Trends in Computing and Communication (, 2017)
Automatic filtering of spam emails becomes essential feature for a good email service provider. To gain direct or indirect benefits organizations/individuals are sending a lot of spam emails. Such kind emails activities ...
Comparison of classification techniques for intrusion detection dataset using WEKA
(Institute of Electrical and Electronics Engineers Inc., 2014)
As the network based applications are growing rapidly, the network security mechanisms require more attention to improve speed and precision. The ever evolving new intrusion types pose a serious threat to network security. ...
Combinational feature selection approach for network intrusion detection system
(Institute of Electrical and Electronics Engineers Inc., 2015)
In the era of digital world, the computer networks are receiving multidimensional advancements. Due to these advancements more and more services are available for malicious exploitation. New vulnerabilities are found from ...
Classification of defective modules using object-oriented metrics
(Inderscience Enterprises Ltd., 2017)
Software defect in today's era is crucial in the field of software engineering. Most of the organisations use various techniques to predict defects in their products before they are delivered. Defect prediction techniques ...
Detection of phishing websites using C4.5 data mining algorithm
(Institute of Electrical and Electronics Engineers Inc., 2018)
Phishing sites are fake sites that are made by deceptive persons which are copy of genuine sites. These websites look like an official website of any company such as bank, institute, etc. The main aim of phishing is that ...