hrcak mascot   Srce   HID

Izvorni znanstveni članak
https://doi.org/10.2498/cit.1000984

Suspicious E-mail Detection via Decision Tree: A Data Mining Approach

Ramasamy Rajaram
Appavu Balamurugan

Puni tekst: engleski, pdf (621 KB) str. 161-169 preuzimanja: 2.162* citiraj
APA 6th Edition
Rajaram, R. i Balamurugan, A. (2007). Suspicious E-mail Detection via Decision Tree: A Data Mining Approach. Journal of computing and information technology, 15 (2), 161-169. https://doi.org/10.2498/cit.1000984
MLA 8th Edition
Rajaram, Ramasamy i Appavu Balamurugan. "Suspicious E-mail Detection via Decision Tree: A Data Mining Approach." Journal of computing and information technology, vol. 15, br. 2, 2007, str. 161-169. https://doi.org/10.2498/cit.1000984. Citirano 25.02.2021.
Chicago 17th Edition
Rajaram, Ramasamy i Appavu Balamurugan. "Suspicious E-mail Detection via Decision Tree: A Data Mining Approach." Journal of computing and information technology 15, br. 2 (2007): 161-169. https://doi.org/10.2498/cit.1000984
Harvard
Rajaram, R., i Balamurugan, A. (2007). 'Suspicious E-mail Detection via Decision Tree: A Data Mining Approach', Journal of computing and information technology, 15(2), str. 161-169. https://doi.org/10.2498/cit.1000984
Vancouver
Rajaram R, Balamurugan A. Suspicious E-mail Detection via Decision Tree: A Data Mining Approach. Journal of computing and information technology [Internet]. 2007 [pristupljeno 25.02.2021.];15(2):161-169. https://doi.org/10.2498/cit.1000984
IEEE
R. Rajaram i A. Balamurugan, "Suspicious E-mail Detection via Decision Tree: A Data Mining Approach", Journal of computing and information technology, vol.15, br. 2, str. 161-169, 2007. [Online]. https://doi.org/10.2498/cit.1000984

Sažetak
This paper proposes a new method to detect unusual and deceptive communication in email data. Deception theory suggests that deceptive writing is characterized by reduced frequency of first person pronouns and exclusive words and elevated frequency of negative emotion words and action verbs. We apply this model of deception to the set of Email dataset, then applied ID3 algorithm to generate the decision tree .The decision tree that is generated is used to test the email as deceptive or not. In particular we are interested in detecting fraudulent and possibly criminal behavior from such data.

Hrčak ID: 44629

URI
https://hrcak.srce.hr/44629

Posjeta: 2.387 *