Analysis of Email Fraud detection using WEKA Tool
classification
💻 cs.CR
keywords
dataminingemailprivacywhileanalysisapplicationsassociations
pith:GVW5DUDH Add to your LaTeX paper
What is a Pith Number?\usepackage{pith}
\pithnumber{GVW5DUDH}
Prints a linked pith:GVW5DUDH badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more
read the original abstract
Data mining is also being useful to give solutions for invasion finding and auditing. While data mining has several applications in protection, there are also serious privacy fears. Because of email mining, even inexperienced users can connect data and make responsive associations. Therefore we must to implement the privacy of persons while working on practical data mining
This paper has not been read by Pith yet.
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.