2016
DOI: 10.5815/ijitcs.2016.01.02
|View full text |Cite
|
Sign up to set email alerts
|

Study on the Effectiveness of Spam Detection Technologies

Abstract: Abstract-Nowadays, spam has become serious issue for computer security, because it becomes a main source for disseminating threats, including viruses, worms and phishing attacks. Currently, a large volume of received emails are spam. Different approaches to combating these unwanted messages, including challenge response model, whitelisting, blacklisting, email signatures and different machine learning methods, are in place to deal with this issue. These solutions are available for end users but due to dynamic … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 24 publications
0
7
0
Order By: Relevance
“…There is scope of research in this field and some research works have been conducted on it. There are different categories of SMS spam filtering such as white listing and black listing, content-based, non-content based, collaborative approaches and challenge-response technique [4], [5], [12], [29]. The techniques are used in client side, server side or in both client and server side [4].…”
Section: Background and Related Workmentioning
confidence: 99%
“…There is scope of research in this field and some research works have been conducted on it. There are different categories of SMS spam filtering such as white listing and black listing, content-based, non-content based, collaborative approaches and challenge-response technique [4], [5], [12], [29]. The techniques are used in client side, server side or in both client and server side [4].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Similarly, prospective areas of application of big data technology are: (1) airline traffic control; (2) market ing analysis; (3) electronic encyclopedia summarizat ion system as highlighted by Hatipoglu and Omurca in 2016 in their paper A Turkish Wikipedia Text Su mmarizat ion System for Mobile Devices [14]; (4) agro-industrial engineering projects; (5) stock e xchange predict ions; (6) spam detection mechanisms as underlined by Iqbal, Abid, Ahmad, and Khurshid in 2016 in their paper Study on the Effectiveness of Spam Detection Technologies [15]; political campaigns; economic research; drug discovery; mo lecular analysis; weather forecast; route maps analysis; music creation; colonoscopy analysis; and many others.…”
Section: Health Informaticsmentioning
confidence: 99%
“…The sender of spam mails has no prior relationship with the receivers but gathers the addresses from different sources such as phone books and filled forms. Spam messages are fast growing to be one of the most serious threats to users of E-mail messages because it is a major means of sending threats, including viruses, worms and phishing attacks [4], [5], [6], [7].…”
Section: Introductionmentioning
confidence: 99%