A Model for Identifying Phishing E-Mail Based on Structural Properties

Provided by: C.V.Raman Group of Institution
Topic: Security
Format: PDF
The widespread use of email caused the number of warnings being made about the dark side the authors' technological revolution to increase and they are becoming uniquely vulnerable to many mysterious and malicious threats. Viruses, worms, and other forms of malicious software started targeting their email inboxes to propagate. Spam and other forms of unsolicited bulk electronic commerce started filling their email inboxes and invading their privacy. Phishing and other forms of fraud attacks have been using email as their primary communication channel to trick users into giving out their credentials.

Find By Topic