2016 International Conference on Collaboration Technologies and Systems (CTS) 2016
DOI: 10.1109/cts.2016.0052
|View full text |Cite
|
Sign up to set email alerts
|

Content Based Spam E-mail Filtering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 12 publications
0
12
0
Order By: Relevance
“…This site is extremely an imagine or changed site. When clients go to this site, they're approached to enter individual information to be sent to the phishing assailant [1,2]. Phishing is regularly used to become familiar with somebody's secret phrase or charge card data.…”
Section: A a Standard Means For Inter Communicationmentioning
confidence: 99%
See 1 more Smart Citation
“…This site is extremely an imagine or changed site. When clients go to this site, they're approached to enter individual information to be sent to the phishing assailant [1,2]. Phishing is regularly used to become familiar with somebody's secret phrase or charge card data.…”
Section: A a Standard Means For Inter Communicationmentioning
confidence: 99%
“…The streamlined highlights are sent into weka tool help support vector machine to group the website as genuine or forged. Liu P et al [16] had attempted to locate a viable answer for sifting spam messages in their work. The prescribed methodology for the investigating of the utilized content is about the E-mail as a watchword just to execute multiplex word handling.…”
Section: Existing Workmentioning
confidence: 99%
“…Spam mails or unsolicited mails can be categorized into two major types-i.) Content or text-based spam mail [12][13] and ii.) Image based spam mails [5][6].…”
Section: Prelimineriesmentioning
confidence: 99%
“…The rough set theory is a mathematical tool for modeling incomplete or imprecise information [5]. It has been used for both feature selection and knowledge discovery in a number of real world domains; and, the rough set theory uses feature selection for classification of mails.…”
Section: Rough Set Theorymentioning
confidence: 99%
“…Peter J. Denning's article [17] is one of the first papers to consider this serious problem. The first mathematical apparatus applied to spam filtering systems is the Bayes' algorithm, which was used first by Sahami et.al in 1996 and then by the other researchers [5][6][7][8].…”
Section: Introduction (Heading 1)mentioning
confidence: 99%