Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2020
Comparative study of classification approaches for e-mail analysis
International Journal of Information and Computer Security (IJICS), Volume 13, Issue 3-4Pages 411–427https://doi.org/10.1504/ijics.2020.109485Illicit messages like threatening and abusive messages affect emotions and psychology of a person. Such messages start exerting influence on mental status, and ultimately physical condition of a person. E-mails are one of the popularly used sources, for ...
- research-articleAugust 2014
E-mail categorization using partially related training examples
IIiX '14: Proceedings of the 5th Information Interaction in Context SymposiumPages 86–95https://doi.org/10.1145/2637002.2637014Automatic e-mail categorization with traditional classification methods requires labelling of training data. In a real-life setting, this labelling disturbs the working flow of the user. We argue that it might be helpful to use documents, which are ...
- research-articleAugust 2012
Using file system content to organize e-mail
IIIX '12: Proceedings of the 4th Information Interaction in Context SymposiumPages 290–293https://doi.org/10.1145/2362724.2362777This paper is about using existing directory structures on the file system as models for e-mail classification. This is motivated by the aim to reduce the effort for users to organize their information flow.
Classifiers were trained on categorized ...
- ArticleNovember 2010
Exploiting concept clumping for efficient incremental e-mail categorization
ADMA'10: Proceedings of the 6th international conference on Advanced data mining and applications - Volume Part IIPages 244–258We introduce a novel approach to incremental e-mail categorization based on identifying and exploiting "clumps" of messages that are classified similarly. Clumping reflects the local coherence of a classification scheme and is particularly important in ...
- ArticleOctober 2009
An Intelligent Automatic Hoax Detection System
KES '09: Proceedings of the 13th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems: Part IPages 318–325https://doi.org/10.1007/978-3-642-04595-0_39Although they sometimes seem harmless, hoaxes represent not-negligible threat to individuals' awareness of real-life situations by deceiving them, and at the same time doing harm to the image of their organizations, which can lead to substantial ...
- ArticleSeptember 2009
An AIS-based e-mail classification method
This paper proposes a new e-mail classification method based on the Artificial Immune System (AIS), which is endowed with good diversity and self-adaptive ability by using the immune learning, immune memory, and immune recognition. In our method, the ...
- research-articleMarch 2009
Improved spam filtering by extraction of information from text embedded image e-mail
SAC '09: Proceedings of the 2009 ACM symposium on Applied ComputingPages 1754–1755https://doi.org/10.1145/1529282.1529677The increase of image spam, a kind of spam in which the text message is embedded into an attached image to defeat spam filtering techniques, is becoming an increasingly major problem. For nearly a decade, content based filtering using text ...
- research-articleMarch 2009
Spam decisions on gray e-mail using personalized ontologies
SAC '09: Proceedings of the 2009 ACM symposium on Applied ComputingPages 1262–1266https://doi.org/10.1145/1529282.1529565E-mail is one of the most common communication methods among people on the Internet. However, the increase of e-mail misuse/abuse has resulted in an increasing volume of spam e-mail over recent years. As spammers always try to find a way to evade ...
- ArticleMarch 2023
Detecting Phishing E-mails by Heterogeneous Classification
Intelligent Data Engineering and Automated Learning - IDEAL 2007Pages 296–305https://doi.org/10.1007/978-3-540-77226-2_31AbstractThis paper presents a system for classifying e-mails into two categories, legitimate and fraudulent. This classifier system is based on the serial application of three filters: a Bayesian filter that classifies the textual content of e-mails, a ...
- ArticleDecember 2007
Detecting phishing e-mails by heterogeneous classification
IDEAL'07: Proceedings of the 8th international conference on Intelligent data engineering and automated learningPages 296–305This paper presents a system for classifying e-mails into two categories, legitimate and fraudulent. This classifier system is based on the serial application of three filters: a Bayesian filter that classifies the textual content of e-mails, a rule- ...
- ArticleAugust 2007
Trinitya: distributed defense against transient spam-bots
PODC '07: Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computingPages 378–379https://doi.org/10.1145/1281100.1281182Transient spam-bots are hijacked computers that are connected to the Internet for short periods of time, during which they send large amounts of spam. These spam-bots have become a principle source of spam; against which, static countermeasures such as ...
- ArticleSeptember 2006
An interactive hybrid system for identifying and filtering unsolicited e-mail
IDEAL'06: Proceedings of the 7th international conference on Intelligent Data Engineering and Automated LearningPages 779–788https://doi.org/10.1007/11875581_94This paper presents a system for automatically detecting and filtering unsolicited electronic messages. The underlying hybrid filtering method is based on e-mail origin and content. The system classifies each of the three parts of e-mails separately by ...
- ArticleDecember 2004
Component-based recommendation agent system for efficient email inbox management
CIS'04: Proceedings of the First international conference on Computational and Information SciencePages 812–818https://doi.org/10.1007/978-3-540-30497-5_126This study suggests a recommendation agent system that the user can optimally sort out incoming email messages according to category. The system is an effective way to manage ever-increasing email documents. For more accurate classification, the Bayesian ...