DOI: 10.1007/978-3-540-72905-1_41
|View full text |Cite
|
Sign up to set email alerts
|

Architecture of Adaptive Spam Filtering Based on Machine Learning Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 5 publications
0
9
0
Order By: Relevance
“…The sender's email address within an email can be faked, allowing intruders to easily bypass black-lists. According to the research in reference (Islam and Zhou, 2007;Bergholz et al, 2008) the authors noted that although the non-classification based filtering can achieve substantial performance, this method often has a high rate of false positives, making it quite risky to use on its own, as a standard stand-alone filtering system. Although our approach differs from the blacklist-based approaches, the proposed approach will complement the existing approaches as email is the primary channel for phishers to reach victims.…”
Section: Non-classification Algorithmsmentioning
confidence: 96%
See 2 more Smart Citations
“…The sender's email address within an email can be faked, allowing intruders to easily bypass black-lists. According to the research in reference (Islam and Zhou, 2007;Bergholz et al, 2008) the authors noted that although the non-classification based filtering can achieve substantial performance, this method often has a high rate of false positives, making it quite risky to use on its own, as a standard stand-alone filtering system. Although our approach differs from the blacklist-based approaches, the proposed approach will complement the existing approaches as email is the primary channel for phishers to reach victims.…”
Section: Non-classification Algorithmsmentioning
confidence: 96%
“…Given that classification algorithms outperform other methods, when used in text classification (TC) (Islam and Zhou, 2007) and other classification areas like biometric recognition and image classification (Islam and Zhou, 2007;Islam et al, 2009;Fette et al, 2007), researchers are also drawn to its uses for phishing email filtering.…”
Section: Classification Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…One is User selection technique and another is sender verification technique [12]. The flow diagram of the analyser is shown in the figure 5.…”
Section: Analysis Of Gl Emailsmentioning
confidence: 99%
“…It also minimizes what we know about human limitations, for example, memory and complex computations. Welldesigned interface reduces errors, training time and costs [5,6,10,12]. This paper proposes an effective and efficient email categorization using a multi-stage classification ensembles technique.…”
Section: Introductionmentioning
confidence: 99%