2017
DOI: 10.1007/s10586-017-1615-8
|View full text |Cite
|
Sign up to set email alerts
|

Visual and textual features based email spam classification using S-Cuckoo search and hybrid kernel support vector machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 41 publications
0
9
0
Order By: Relevance
“…LIBSVM Support vector machine tool [12] is used to simulate the results and data is converted to SVM Data format. Training and test data sets are organized in the following format for the purpose of using LibSVM tool.…”
Section: Experimentation Results and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…LIBSVM Support vector machine tool [12] is used to simulate the results and data is converted to SVM Data format. Training and test data sets are organized in the following format for the purpose of using LibSVM tool.…”
Section: Experimentation Results and Discussionmentioning
confidence: 99%
“…Hence, the research work may be used in categorization of large number of categories of emails. Overall results yield the superior performance as indicated in figures [12,13] through Receiver operating curve (ROC).…”
Section: Fig12: Auc Curve-training Datamentioning
confidence: 99%
“…However, main advantage of this approach was its highest accuracy, but failed to detect the spam messages effectively. Kumaresan T [28] et al introduced a spam categorization strategy called S-Cuckoo and hybrid kernelbased support vector machine (HKSVM). This method involved mainly three phases, namely textual and visual feature extraction, best feature selection, and spam classification.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to this, it also consumes lot of user's valuable time as well as provoking them to detect and destroy the unnecessary messages. Thus, spam detection still remains as one of the challenging tasks for many organizations [28]. However, there have been different types of methods to alleviate the quantity of spam.…”
Section: Introductionmentioning
confidence: 99%
“…Social engineering and enterprise security continue to be significant because organizations progressively have observed a vulnerable link exists in the security chain (Bongiorno et al, 2018). Without employing risk mitigation controls, many organizations would be unable to monitor well-known threats, recognize new threats, and gauge existing processes effectively (Kumaresan et al, 2017). Therefore, demonstrating why organizations are apprehensive about integrating external applications and services into their existing organizational infrastructure (Janssen et al, 2017).…”
Section: Introductionmentioning
confidence: 99%