Implementation of Spyware Detection Using Data Mining With Decision Tree Algorithm

Download Now
Provided by: International Journal of Engineering Research and Applications (IJERA)
Topic: Big Data
Format: PDF
Any software that monitors user behavior, or gathers information about the user without adequate notice, consent, or control from the user, \"Spyware\" represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and send it to a third party without informed user consent. The authors' approach is inspired by DM-based malicious code detectors, which are known to work well for detecting viruses and similar software.
Download Now

Find By Topic