2020
DOI: 10.1109/access.2020.3017082
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Clustering of Emails Into Spam and Ham: The Foundational Study of a Comprehensive Unsupervised Framework

Abstract: The spread and adoption of spam emails in malicious activities like information and identity theft, malware propagation, monetary and reputational damage etc. are on the rise with increased effectiveness and diversification. Without doubt these criminal acts endanger the privacy of many users and businesses'. Several research initiatives have taken place to address the issue with no complete solution until now; and we believe an intelligent and automated methodology should be the way forward to tackle the chal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 45 publications
(22 citation statements)
references
References 60 publications
0
20
0
Order By: Relevance
“…The graph facilitates a connection to zi with another node or element zj, which belongs to k nearest neighbors of zi. The Weight Matrix W of T, defined using (3), illustrates the local structure of the data space [7]. , 7 ∈ <== >7 8 ?…”
Section: B2 Laplacian Score For Feature Selectionmentioning
confidence: 99%
See 3 more Smart Citations
“…The graph facilitates a connection to zi with another node or element zj, which belongs to k nearest neighbors of zi. The Weight Matrix W of T, defined using (3), illustrates the local structure of the data space [7]. , 7 ∈ <== >7 8 ?…”
Section: B2 Laplacian Score For Feature Selectionmentioning
confidence: 99%
“…. 3 c is a suitably chosen constant, and a graph Laplacian, L, (additional discussion in the 'Spectral Clustering' section), is constructed from W. For every feature r, LS -a Laplacian score, is then derived using (4), where D is the Diagonal Matrix of W. Features are then ranked accordingly [7].…”
Section: B2 Laplacian Score For Feature Selectionmentioning
confidence: 99%
See 2 more Smart Citations
“…[2] Some online identity theft schemes include email phishing attempts to lure victims into revealing personal information (e.g., passwords, addresses) and stealing driver's license, credit card, and checking account numbers by hacking into private websites. [3] It also includes unique biometric data (fingerprints, retina scans, facial geometry, iris images, and other unique physical representations), patient identification numbers, and medical records.…”
Section: Identify Theftmentioning
confidence: 99%