Filters








435 Hits in 4.9 sec

Using word similarity to eradicate junk emails

Maria S. Pera, Yiu-Kai Ng
2007 Proceedings of the sixteenth ACM conference on Conference on information and knowledge management - CIKM '07  
In this paper, we present a new tool, JunEX, which relies on the content similarity of emails to eradicate junk emails.  ...  Even though there has been extensive work in the past dedicated to eradicate junk emails, none of the existing junk email detection approaches has been highly successful in solving these problems, since  ...  JunEX analyzes the content of an incoming email and compare it with a previously marked junk email by the user using word similarity in a word-correlation matrix.  ... 
doi:10.1145/1321440.1321581 dblp:conf/cikm/PeraN07 fatcat:imnjtgyxube4ppv7dyzkyw72qy

SpamED: A spam E-mail detection approach based on phrase similarity

Maria Soledad Pera, Yiu-Kai Ng
2009 Journal of the American Society for Information Science and Technology  
In this paper, we propose a spam-email detection approach, called SpamED, which uses the similarity of phrases in emails to detect spam.  ...  Many attempts have been made in the past to eradicate spam emails; however, none has been proved highly effective.  ...  In [22] , we investigated the effectiveness of using (single-)word (i.e., unigram) similarity to detect junk emails with promising results.  ... 
doi:10.1002/asi.20962 fatcat:y5zabhzkqfhtxf7hod4kgt6xqi

Beyond Identity: Addressing Problems that Persist in an Electronic Mail System with Reliable Sender Identification

Brett Watson
2004 International Conference on Email and Anti-Spam  
Such an approach will create a need for integrated policy management facilities in future mail user agents. 1 "Phishing" is the act of impersonating an organisation via email with intent to cause customers  ...  See . 2 3 This is extremely similar to the "responsible submitter" proposal of [1], but I emphasise that my "sender identity" system is a purely imaginary construct (existing only for the purpose of argument  ...  , the recipient could use a similar form to generate disposable addresses on demand.  ... 
dblp:conf/ceas/Watson04 fatcat:ovx5xlr7k5arrd2nle7ilg3tee

The Process of Multilevel Filtering on Spam Mail

B. Bala Krishnudu, et al., B. Bala Krishnudu, et al.,, TJPRC
2021 International Journal of Computer Science Engineering and Information Technology Research  
The Classification of Emails gets puzzled with the issues of reduction with the dimensionality, time complexity, categorization exactness (or) classification accuracy.  ...  The main aim of the categorization or classification of text is to organize the document into various predefined categories.  ...  End use X sends an email to the user Y B.  ... 
doi:10.24247/ijcseitrjun20212 fatcat:v6s4w6oixjbhfbft6tqctlpdei

Bayesian Based Comment Spam Defending Tool

Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae Kwang Lee
2010 International journal of network security and its applications  
Spam in blogs is called blog spam or comment spam.It is done by posting comments or flooding spams to the services such as blogs, forums,news,email archives and guestbooks.  ...  In this paper, we propose a software tool to prevent such blog spams by using Bayesian Algorithm based technique. It is derived from Bayes' Theorem.  ...  My space is similar to Live journal and both are free service providers.  ... 
doi:10.5121/ijnsa.2010.2420 fatcat:lrpf2aenrnhylleclzv6b2k5m4

YOU'VE GOT MAIL: TRACKING AND FRAMING ACADEMIC LIVES

2017 Knowledge Cultures  
Awareness of this contradiction stimulated a proposal to investigate email use over a year of an academic's life to explore tensions among administrative, research and teaching tasks, using thirdgeneration  ...  The study concludes with a need to detach from a personal response to email and recognize its contribution to collective practices and their implications, including resistance and solidarity in the face  ...  Acknowledgements The author is extremely grateful to the editors of this special edition -Sarah Hayes and Petar Jandric -for their patience, encouragement in the face of despair, and helpful suggestions  ... 
doi:10.22381/kc5220174 fatcat:5ji2oeu65vag5c6jxva42iyicq

Spam, a Digital Pollution and Ways to Eradicate It

2019 International Journal of Engineering and Advanced Technology  
This survey is thus mainly used to discuss and analyze the recent research that had been put forth regarding the spam detection in social media sites such as Twitter.  ...  Spammers have also become creative in framing their content to cleverly escape the classifiers.  ...  Also, some companies try to spam, it works as a marketing strategy as well with the help of links [17] . Email spam, also known as junk, is basically mail that is sent a huge number of times.  ... 
doi:10.35940/ijeat.b4107.129219 fatcat:uze7gfg3wrgjdmetvpuhzhl7p4

Stemming the Tide: The Role of Subscription Agents and Consortia in Library Communications

Lindsey Reno
2015 Against the Grain  
No amount of word-smithing or graphic design magic is going to change that.  ...  Library Consortia Those librarians who work with consortia may find that emails to consortial listservs about product offers do not get the standard eradication that befalls most other product offers.  ... 
doi:10.7771/2380-176x.7226 fatcat:imvqa7yruzhxpkatbaybs2kpxe

A Comprehensive Survey for Intelligent Spam Email Detection

Asif Karim, Sami Azam, Bharanidharan Shanmugam, Krishnan Kannoorpatti, Mamoun Alazab
2019 IEEE Access  
(C) First part of SMTP Data, containing information like from, to, date, subject -appearing in most email clients (D) Second part of SMTP Data, containing email body including text content, and attachment  ...  This comprehensive survey paves the way for future research endeavors addressing theoretical and empirical aspects related to intelligent spam email detection.  ...  To prepare the training set, words are collected from a collection of junk emails and are separated as good or bad as well as the length is also taken into consideration.  ... 
doi:10.1109/access.2019.2954791 fatcat:ikt6cayggbb2dkrm52fxzz2dqm

Making place for clutter and other ideas of home

Laurel Swan, Alex S. Taylor, Richard Harper
2008 ACM Transactions on Computer-Human Interaction  
These findings are used to consider what it might mean to design for the home, and to do so in ways that are sensitive to the idiosyncratic systems of household organization.  ...  The shared but idiosyncratic practices families use to contain their clutter are seen to be one of the ways in which the home, or at least the idea of home, is collectively produced.  ...  ACKNOWLEDGMENTS We are hugely grateful to the fieldwork participants who contributed to the findings presented above. Our ideas would have been greatly impoverished without their contributions.  ... 
doi:10.1145/1375761.1375764 fatcat:j6dax225bbgrjo7jklxipopjji

Fear of fluoride

D. Reekie
2017 British Dental Journal  
No amount of academic rebuttal and comprehensive demolition of the junk science of Yiamouyiannis and Burk could ever eradicate it.  ...  At last the 'F' word was mentioned. What sort of toothpaste did they use and did it contain fluoride?  ... 
doi:10.1038/sj.bdj.2017.23 pmid:28084346 fatcat:rbbn6vxeg5gmpebwvkebkpyirm

Machine learning for email spam filtering: review, approaches and open research problems

Emmanuel Gbenga Dada, Joseph Stephen Bassi, Haruna Chiroma, Shafi'i Muhammad Abdulhamid, Adebayo Olusola Adetunmbi, Opeyemi Emmanuel Ajibuwa
2019 Heliyon  
Machine learning methods of recent are being used to successfully detect and filter spam emails.  ...  Discussion on general email spam filtering process, and the various efforts by different researchers in combating spam through the use machine learning techniques was done.  ...  This method normally analyses words, the occurrence, and distributions of words and phrases in the content of emails and used then use generated rules to filter the incoming email spams [28] .  ... 
doi:10.1016/j.heliyon.2019.e01802 pmid:31211254 pmcid:PMC6562150 fatcat:n7qiq4tgnzh7xi6j5c2ah335hy

New Approach for Detection of IRC and P2P Botnets

Hossein Rouhani Zeidanloo, Farhoud Hosseinpour, Farhood Farid Etemad
2010 International Journal of Computer and Electrical Engineering  
Since Artificial Immune System (AIS) is a new bio-inspired model which is applied for solving various problems in the field of information security, we used this concept in our proposed framework to make  ...  We utilized AIS to effectively detect malicious activities in P2P part.  ...  Email (UBE), junk mail, is the practice of sending unwanted email messages, in large quantities to an indiscriminate set of recipients.  ... 
doi:10.7763/ijcee.2010.v2.271 fatcat:u7zkzaelcfdj7l6kyqd4pqvzzy

Development of Cyber Crime and its Regulations in Indonesia

Muhammad Iqbal, Mater of law, Universitas Diponegoro Semarang Jl.Imam Barjo, S.H. No.1-3 Kampus UNDIP Pleburan-Semarang 50241
2021 International journal of social science and human research  
This study also uses secondary legal materials, namely books and journals related to Cyber Crime.  ...  The research method used is normative juridical, using secondary data consisting of primary legal material, namely legislation related to Cyber Crime and examples of Cyber Crime cases in Indonesia.  ...  Sites created using a domain name similar to klikbca.com, and many other examples(Dodo Zaenal Abidin , 2017).  ... 
doi:10.47191/ijsshr/v4-i2-04 fatcat:v7cyowpidbczzohy36lk6zey24

You Are the Only Possible Oracle: Effective Test Selection for End Users of Interactive Machine Learning Systems

Alex Groce, Todd Kulesza, Chaoqiang Zhang, Shalini Shamasunder, Margaret Burnett, Weng-Keen Wong, Simone Stumpf, Shubhomoy Das, Amber Shinsel, Forrest Bice, Kevin McIntosh
2014 IEEE Transactions on Software Engineering  
useful) tests.  ...  We consider the problem of testing this common kind of machine-generated program when the only oracle is an end user : e.g., only you can determine if your email is properly filed.  ...  In use case UC-1, can a user initially rely on the classifier to behave as expected? For example, will a new email client correctly identify junk mail while leaving important messages in your inbox?  ... 
doi:10.1109/tse.2013.59 fatcat:nikdskwkyfcvvexk4yyosa2t64
« Previous Showing results 1 — 15 out of 435 results