Keyphrases
- identity theft
- countermeasures
- phishing attacks
- phishing emails
- spam filtering
- wrapper feature selection
- fraud detection
- malicious activities
- data sets
- security risks
- classification accuracy
- information security
- intrusion detection system
- database systems
- case study
- decision trees
- information retrieval
- database