2018
DOI: 10.22452/mjcs.vol31no4.3
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Suspicious Terrorist Emails Using Text Classification: A Review

Abstract: This paper provides a comprehensive review and analysis of the detection of suspicious terrorist electronic mails (emails) using various phases and methods of text classification. We explored, analyzed, and compared different datasets, features, feature extraction techniques, feature representation techniques, feature selection schemes, text classification techniques, and performance measurement metrics used in the detection of suspicious terrorist e-mails. 30 articles were retrieved from 6 well-known academic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 64 publications
0
3
0
Order By: Relevance
“…Also, accuracy [49], precision [50], recall [51], and f-measure [52] were used to assess the performance of the LSVC classifier over feature selection methods. The proposed feature selection method was evaluated over four learning classifiers such as LSVC, Naïve Bayes (NB) [53], Logistic Regression (LR) [54], and Random Forest (RF) [55]. Fig.…”
Section: Resultsmentioning
confidence: 99%
“…Also, accuracy [49], precision [50], recall [51], and f-measure [52] were used to assess the performance of the LSVC classifier over feature selection methods. The proposed feature selection method was evaluated over four learning classifiers such as LSVC, Naïve Bayes (NB) [53], Logistic Regression (LR) [54], and Random Forest (RF) [55]. Fig.…”
Section: Resultsmentioning
confidence: 99%
“…The confusion matrix is a popular metric for assessing machine learning algorithms. Consequently, selecting proper evaluation criteria is crucial for addressing the data imbalance issue [31][32][33][34]. Again, the "Politics" category data are classified correctly with the value of 677 which is lower compared to "Parenting and Education" category data of 816.…”
Section: A Feature Selectionmentioning
confidence: 99%
“…TC techniques are also important methods in knowledge management, such as content-based recommendation (Hawashin et al, 2019; Wijewickrema et al, 2019; Wu et al, 2020), patent classification (Kim et al, 2020), and information extraction (Al-Yahya, 2018). Besides, TC techniques have been frequently applied to the detection of unwanted messages, including short message spam, junk mails, and suspicious malignant mails (Ezpeleta et al, 2017; Hsiao & Chang, 2008; Mujtaba, Shuib, Raj, & Gunalan 2018; Seyyedi & Minaeibidgoli, 2018).…”
Section: Introductionmentioning
confidence: 99%