作者
Umer Ahmed Butt, Rashid Amin, Hamza Aldabbas, Senthilkumar Mohan, Bader Alouffi, Ali Ahmadian
发表日期
2023/6
期刊
Complex & Intelligent Systems
卷号
9
期号
3
页码范围
3043-3070
出版商
Springer International Publishing
简介
Cloud computing refers to the on-demand availability of personal computer system assets, specifically data storage and processing power, without the client's input. Emails are commonly used to send and receive data for individuals or groups. Financial data, credit reports, and other sensitive data are often sent via the Internet. Phishing is a fraudster's technique used to get sensitive data from users by seeming to come from trusted sources. The sender can persuade you to give secret data by misdirecting in a phished email. The main problem is email phishing attacks while sending and receiving the email. The attacker sends spam data using email and receives your data when you open and read the email. In recent years, it has been a big problem for everyone. This paper uses different legitimate and phishing data sizes, detects new emails, and uses different features and algorithms for classification. A modified …
引用总数
学术搜索中的文章
UA Butt, R Amin, H Aldabbas, S Mohan, B Alouffi… - Complex & Intelligent Systems, 2023