Proceedings of the 2010 IEEE 6th International Conference on Intelligent Computer Communication and Processing 2010
DOI: 10.1109/iccp.2010.5606466
|View full text |Cite
|
Sign up to set email alerts
|

Spam detection filter using KNN algorithm and resampling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(24 citation statements)
references
References 5 publications
0
24
0
Order By: Relevance
“…Physical amounts that are relied upon to be the whole of numerous free procedures, (for example, estimation mistakes) frequently have conveyances that are almost normal. [3] Moreover, numerous outcomes and techniques, (for example, spread of vulnerability and minimum squares parameter fitting) can be determined scientifically in express shape when the important factors are regularly disseminated.…”
Section: Gaussian Naive Bayesmentioning
confidence: 99%
See 1 more Smart Citation
“…Physical amounts that are relied upon to be the whole of numerous free procedures, (for example, estimation mistakes) frequently have conveyances that are almost normal. [3] Moreover, numerous outcomes and techniques, (for example, spread of vulnerability and minimum squares parameter fitting) can be determined scientifically in express shape when the important factors are regularly disseminated.…”
Section: Gaussian Naive Bayesmentioning
confidence: 99%
“…Spam message can contain text, image, video and also voice data. Spam can be sent via web, fax, telephonic (text messages) [3].…”
Section: Introductionmentioning
confidence: 99%
“…Spam emails are the junk emails received from illegitimate users that might contain advertisement, malicious code, Virus or to gain personal profit from the user. Spam can be transmitted from any source like Web, Text messages, Fax etc., depending upon the mode of transmission spam can be categorised into various categories like email spam, web spam, text spam, social networking spam [3].…”
Section: Email Spammentioning
confidence: 99%
“…This paper makes use of the K-NN algorithm for classification of spam emails on the predefined dataset using feature's selected from the content and emails properties. Resampling of the datasets to appropriate set and positive distribution was carried out to make the algorithm efficient for feature selection [3].…”
Section: Email Spammentioning
confidence: 99%
“…A number of techniques benefit of clustering as a part of their spam detection approach like: clustering followed by KNN classification [10], [11] and clustering followed by SVM classification [12]. In [13], Jung and Sit check the use of DNS blacklists for address-based filtering of spams.…”
Section: Related Workmentioning
confidence: 99%