2018
DOI: 10.26483/ijarcs.v9i2.5571
|View full text |Cite
|
Sign up to set email alerts
|

Classification Techniques Using Spam Filtering Email

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 1 publication
0
7
0
Order By: Relevance
“…ML techniques are being employed to detect and classify a message as spam or ham. ML techniques have a significant contribution to detect spam messages on computer [26,27], SMS messages on mobile [28], spam tweets [29], or images/video [30,31].…”
Section: Introductionmentioning
confidence: 99%
“…ML techniques are being employed to detect and classify a message as spam or ham. ML techniques have a significant contribution to detect spam messages on computer [26,27], SMS messages on mobile [28], spam tweets [29], or images/video [30,31].…”
Section: Introductionmentioning
confidence: 99%
“…There are other various ML techniques that can forecast data (Applications et al, n.d.). ML-techniques are significantly involved in detecting computer spam communications (Chandrasekar, 2018), mobile text messages (Abdulhamid et al, 2017), spam tweets, and video pictures. The IDS is a computer network security system for scanning network vulnerabilities against malicious invasions.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Machine learning methods are used to combat such threats. Machine learning methods make a significant contribution to the detection of spam messages on a computer [16,17], SMS messages on mobile devices [18], spam tweets [19] or images/videos [20,21].…”
Section: Brief Overview Of Used Articlesmentioning
confidence: 99%