2015
DOI: 10.17485/ijst/2015/v8is9/55320
|View full text |Cite
|
Sign up to set email alerts
|

Spam E-mail Filtering using ECOS Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…Botnets for example are used for launching attacks of distributed denial-of-service (DDoS). They are used for identifying thefts, sending spam and phishing emails (Ammar et al, 2018;Almomani et al, 2015Almomani et al, , 2013Almomani, 2018;Alieyan et al, 2018;Alauthaman et al, 2018;Alauthman et al, 2020;Alieyan et al, 2019;Al-Kasassbeh et al, 2020;Alauthman and Albesani, 2019;Al-Nawasrah et al, 2020). Fast flux networks (FFNs) serve as a kind of botnet.…”
Section: Introductionmentioning
confidence: 99%
“…Botnets for example are used for launching attacks of distributed denial-of-service (DDoS). They are used for identifying thefts, sending spam and phishing emails (Ammar et al, 2018;Almomani et al, 2015Almomani et al, , 2013Almomani, 2018;Alieyan et al, 2018;Alauthaman et al, 2018;Alauthman et al, 2020;Alieyan et al, 2019;Al-Kasassbeh et al, 2020;Alauthman and Albesani, 2019;Al-Nawasrah et al, 2020). Fast flux networks (FFNs) serve as a kind of botnet.…”
Section: Introductionmentioning
confidence: 99%