pith. sign in

arxiv: 1405.0787 · v1 · pith:GVW5DUDHnew · submitted 2014-05-05 · 💻 cs.CR

Analysis of Email Fraud detection using WEKA Tool

classification 💻 cs.CR
keywords dataminingemailprivacywhileanalysisapplicationsassociations
0
0 comments X p. Extension
pith:GVW5DUDH Add to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{GVW5DUDH}

Prints a linked pith:GVW5DUDH badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

read the original abstract

Data mining is also being useful to give solutions for invasion finding and auditing. While data mining has several applications in protection, there are also serious privacy fears. Because of email mining, even inexperienced users can connect data and make responsive associations. Therefore we must to implement the privacy of persons while working on practical data mining

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.