A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Using word similarity to eradicate junk emails
2007
Proceedings of the sixteenth ACM conference on Conference on information and knowledge management - CIKM '07
In this paper, we present a new tool, JunEX, which relies on the content similarity of emails to eradicate junk emails. ...
Even though there has been extensive work in the past dedicated to eradicate junk emails, none of the existing junk email detection approaches has been highly successful in solving these problems, since ...
JunEX analyzes the content of an incoming email and compare it with a previously marked junk email by the user using word similarity in a word-correlation matrix. ...
doi:10.1145/1321440.1321581
dblp:conf/cikm/PeraN07
fatcat:imnjtgyxube4ppv7dyzkyw72qy
SpamED: A spam E-mail detection approach based on phrase similarity
2009
Journal of the American Society for Information Science and Technology
In this paper, we propose a spam-email detection approach, called SpamED, which uses the similarity of phrases in emails to detect spam. ...
Many attempts have been made in the past to eradicate spam emails; however, none has been proved highly effective. ...
In [22] , we investigated the effectiveness of using (single-)word (i.e., unigram) similarity to detect junk emails with promising results. ...
doi:10.1002/asi.20962
fatcat:y5zabhzkqfhtxf7hod4kgt6xqi
Beyond Identity: Addressing Problems that Persist in an Electronic Mail System with Reliable Sender Identification
2004
International Conference on Email and Anti-Spam
Such an approach will create a need for integrated policy management facilities in future mail user agents. 1 "Phishing" is the act of impersonating an organisation via email with intent to cause customers ...
See . 2 3 This is extremely similar to the "responsible submitter" proposal of [1], but I emphasise that my "sender identity" system is a purely imaginary construct (existing only for the purpose of argument ...
, the recipient could use a similar form to generate disposable addresses on demand. ...
dblp:conf/ceas/Watson04
fatcat:ovx5xlr7k5arrd2nle7ilg3tee
The Process of Multilevel Filtering on Spam Mail
2021
International Journal of Computer Science Engineering and Information Technology Research
The Classification of Emails gets puzzled with the issues of reduction with the dimensionality, time complexity, categorization exactness (or) classification accuracy. ...
The main aim of the categorization or classification of text is to organize the document into various predefined categories. ...
End use X sends an email to the user Y B. ...
doi:10.24247/ijcseitrjun20212
fatcat:v6s4w6oixjbhfbft6tqctlpdei
Bayesian Based Comment Spam Defending Tool
2010
International journal of network security and its applications
Spam in blogs is called blog spam or comment spam.It is done by posting comments or flooding spams to the services such as blogs, forums,news,email archives and guestbooks. ...
In this paper, we propose a software tool to prevent such blog spams by using Bayesian Algorithm based technique. It is derived from Bayes' Theorem. ...
My space is similar to Live journal and both are free service providers. ...
doi:10.5121/ijnsa.2010.2420
fatcat:lrpf2aenrnhylleclzv6b2k5m4
YOU'VE GOT MAIL: TRACKING AND FRAMING ACADEMIC LIVES
2017
Knowledge Cultures
Awareness of this contradiction stimulated a proposal to investigate email use over a year of an academic's life to explore tensions among administrative, research and teaching tasks, using thirdgeneration ...
The study concludes with a need to detach from a personal response to email and recognize its contribution to collective practices and their implications, including resistance and solidarity in the face ...
Acknowledgements The author is extremely grateful to the editors of this special edition -Sarah Hayes and Petar Jandric -for their patience, encouragement in the face of despair, and helpful suggestions ...
doi:10.22381/kc5220174
fatcat:5ji2oeu65vag5c6jxva42iyicq
Spam, a Digital Pollution and Ways to Eradicate It
2019
International Journal of Engineering and Advanced Technology
This survey is thus mainly used to discuss and analyze the recent research that had been put forth regarding the spam detection in social media sites such as Twitter. ...
Spammers have also become creative in framing their content to cleverly escape the classifiers. ...
Also, some companies try to spam, it works as a marketing strategy as well with the help of links [17] . Email spam, also known as junk, is basically mail that is sent a huge number of times. ...
doi:10.35940/ijeat.b4107.129219
fatcat:uze7gfg3wrgjdmetvpuhzhl7p4
Stemming the Tide: The Role of Subscription Agents and Consortia in Library Communications
2015
Against the Grain
No amount of word-smithing or graphic design magic is going to change that. ...
Library Consortia Those librarians who work with consortia may find that emails to consortial listservs about product offers do not get the standard eradication that befalls most other product offers. ...
doi:10.7771/2380-176x.7226
fatcat:imvqa7yruzhxpkatbaybs2kpxe
A Comprehensive Survey for Intelligent Spam Email Detection
2019
IEEE Access
(C) First part of SMTP Data, containing information like from, to, date, subject -appearing in most email clients (D) Second part of SMTP Data, containing email body including text content, and attachment ...
This comprehensive survey paves the way for future research endeavors addressing theoretical and empirical aspects related to intelligent spam email detection. ...
To prepare the training set, words are collected from a collection of junk emails and are separated as good or bad as well as the length is also taken into consideration. ...
doi:10.1109/access.2019.2954791
fatcat:ikt6cayggbb2dkrm52fxzz2dqm
Making place for clutter and other ideas of home
2008
ACM Transactions on Computer-Human Interaction
These findings are used to consider what it might mean to design for the home, and to do so in ways that are sensitive to the idiosyncratic systems of household organization. ...
The shared but idiosyncratic practices families use to contain their clutter are seen to be one of the ways in which the home, or at least the idea of home, is collectively produced. ...
ACKNOWLEDGMENTS We are hugely grateful to the fieldwork participants who contributed to the findings presented above. Our ideas would have been greatly impoverished without their contributions. ...
doi:10.1145/1375761.1375764
fatcat:j6dax225bbgrjo7jklxipopjji
Fear of fluoride
2017
British Dental Journal
No amount of academic rebuttal and comprehensive demolition of the junk science of Yiamouyiannis and Burk could ever eradicate it. ...
At last the 'F' word was mentioned. What sort of toothpaste did they use and did it contain fluoride? ...
doi:10.1038/sj.bdj.2017.23
pmid:28084346
fatcat:rbbn6vxeg5gmpebwvkebkpyirm
Machine learning for email spam filtering: review, approaches and open research problems
2019
Heliyon
Machine learning methods of recent are being used to successfully detect and filter spam emails. ...
Discussion on general email spam filtering process, and the various efforts by different researchers in combating spam through the use machine learning techniques was done. ...
This method normally analyses words, the occurrence, and distributions of words and phrases in the content of emails and used then use generated rules to filter the incoming email spams [28] . ...
doi:10.1016/j.heliyon.2019.e01802
pmid:31211254
pmcid:PMC6562150
fatcat:n7qiq4tgnzh7xi6j5c2ah335hy
New Approach for Detection of IRC and P2P Botnets
2010
International Journal of Computer and Electrical Engineering
Since Artificial Immune System (AIS) is a new bio-inspired model which is applied for solving various problems in the field of information security, we used this concept in our proposed framework to make ...
We utilized AIS to effectively detect malicious activities in P2P part. ...
Email (UBE), junk mail, is the practice of sending unwanted email messages, in large quantities to an indiscriminate set of recipients. ...
doi:10.7763/ijcee.2010.v2.271
fatcat:u7zkzaelcfdj7l6kyqd4pqvzzy
Development of Cyber Crime and its Regulations in Indonesia
2021
International journal of social science and human research
This study also uses secondary legal materials, namely books and journals related to Cyber Crime. ...
The research method used is normative juridical, using secondary data consisting of primary legal material, namely legislation related to Cyber Crime and examples of Cyber Crime cases in Indonesia. ...
Sites created using a domain name similar to klikbca.com, and many other examples(Dodo Zaenal Abidin , 2017). ...
doi:10.47191/ijsshr/v4-i2-04
fatcat:v7cyowpidbczzohy36lk6zey24
You Are the Only Possible Oracle: Effective Test Selection for End Users of Interactive Machine Learning Systems
2014
IEEE Transactions on Software Engineering
useful) tests. ...
We consider the problem of testing this common kind of machine-generated program when the only oracle is an end user : e.g., only you can determine if your email is properly filed. ...
In use case UC-1, can a user initially rely on the classifier to behave as expected? For example, will a new email client correctly identify junk mail while leaving important messages in your inbox? ...
doi:10.1109/tse.2013.59
fatcat:nikdskwkyfcvvexk4yyosa2t64
« Previous
Showing results 1 — 15 out of 435 results