Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7742
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAgarwal, Priyank-
dc.contributor.authorVasudeva, Amol [Guided by]-
dc.date.accessioned2022-10-13T06:45:09Z-
dc.date.available2022-10-13T06:45:09Z-
dc.date.issued2019-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7742-
dc.description.abstractThe practice of looking at substantial previous databases so as to produce new data and relationship among them. In this paper a Decision tree in categorizing the suspected mail recognition (emails about crimes). In view of the hypothesis of fraud a suspicious email will have suspicious words and action words. The words such as attack, hijack, RDX, bomb, etc represent the suspicious and action words. We connected this hypothesis to the mail training dataset and then connected ID3 algorithm to create the decision tree. The decision tree then is utilized to categorize the mail as suspicious or not. Specifically, we are keen on recognizing crimes from such information. E-mail communication has become a part of everyday life for millions of people and has changed the way we work. So, it is very important to develop such system to prevent and suspect the criminal activities over the internet.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectSuspicious E-Mailen_US
dc.subjectE-Mail Detectionen_US
dc.subjectKeywordsen_US
dc.titleSuspicious E-Mail Detection using Keywordsen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Suspicious E-Mail Detection using Keywords.pdf1.88 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.