Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/7282
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDakwala, Anuj-
dc.contributor.authorLavingia, Kruti-
dc.contributor.authorShah, Rushabh-
dc.date.accessioned2016-12-29T09:37:36Z-
dc.date.available2016-12-29T09:37:36Z-
dc.date.issued2016-02-
dc.identifier.citationInternational Journal Of Innovative Research In Science and Engineering-
dc.identifier.issn2454-9665-
dc.identifier.urihttp://hdl.handle.net/123456789/7282-
dc.description.abstractThe written works on the recognition of phishing attacks have been surveyed by this article. The vulnerabilities existing in the system due to human component is pointed by the phishing attacks. The clients are the weakest component in the security chain due to the adapted broad mechanism by the numerous cyber-attacks which exploit the end users. The phishing issue can be expanded exclusively such as silver figuring technique to mitigate vulnerability, and to relieve particular attacks, multiple techniques are actualised. The phishing mitigation techniques which were insignificant earlier are surveyed because of the aim of the paper. The offensive defense, correction and detection obliging in the overall mitigation process are presented as high level review of classifications around phishing mitigation techniques.en_US
dc.publisherIJIRSEen_US
dc.relation.ispartofseriesITFCE034-1;-
dc.subjectData Miningen_US
dc.subjectFake Website Detectionen_US
dc.subjectHeuristic Classificationen_US
dc.subjectPhishingen_US
dc.subjectWebsite Classificationen_US
dc.subjectComputer Faculty Paperen_US
dc.subjectFaculty Paperen_US
dc.subjectITFCE034en_US
dc.subjectITFCA009en_US
dc.titleA Novel Approach To Improve The Efficiency Of Fake Websites Detection Techniques: Surveyen_US
dc.typeFaculty Papersen_US
Appears in Collections:Faculty Papers, CE

Files in This Item:
File Description SizeFormat 
ITFCE034-1.pdfITFCE034-1516.62 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.