Ketari et al., 2012 - Google Patents
A study of image spam filtering techniquesKetari et al., 2012
- Document ID
- 15302658999453479582
- Author
- Ketari L
- Chandra M
- Khanum M
- Publication year
- Publication venue
- 2012 Fourth International Conference on Computational Intelligence and Communication Networks
External Links
Snippet
Nowadays, Internet is becoming an incontestable communication mean of choice, through emails, for both professional and personal correspondences. However, emails are not only, efficient, cheap, and rapid mean of communication, but also are becoming favourite lucrative …
- 238000000034 method 0 title abstract description 70
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/30707—Clustering or classification into predefined classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/585—Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chiew et al. | Utilisation of website logo for phishing detection | |
Biggio et al. | A survey and experimental evaluation of image spam filtering techniques | |
Wang et al. | Filtering image spam with near-duplicate detection. | |
Dredze et al. | Learning fast classifiers for image spam. | |
Zareapoor et al. | Feature extraction or feature selection for text classification: A case study on phishing email detection | |
Islam et al. | A multi-tier phishing detection and filtering approach | |
Attar et al. | A survey of image spamming and filtering techniques | |
Mohammed et al. | Adaptive intelligent learning approach based on visual anti-spam email model for multi-natural language | |
Vinayakumar et al. | Deep learning framework for cyber threat situational awareness based on email and url data analysis | |
Kumar Birthriya et al. | A comprehensive survey of phishing email detection and protection techniques | |
Ketari et al. | A study of image spam filtering techniques | |
Rayan | Analysis of e‐Mail Spam Detection Using a Novel Machine Learning‐Based Hybrid Bagging Technique | |
Das et al. | Analysis of an image spam in email based on content analysis | |
Hayati et al. | Evaluation of spam detection and prevention frameworks for email and image spam: a state of art | |
Shyni et al. | A multi-classifier based prediction model for phishing emails detection using topic modelling, named entity recognition and image processing | |
Nivedha et al. | Detection of email spam using Natural Language Processing based Random Forest approach | |
Obaid | Unsupervised approach for email spam filtering using data mining | |
Sivanantham et al. | Web Hazard Identification and Detection Using Deep Learning-A Comparative Study. | |
Divakarla et al. | Predicting Phishing Emails and Websites to Fight Cybersecurity Threats Using Machine Learning Algorithms | |
Wang et al. | Image spam classification based on low-level image features | |
Kumar et al. | Study and comparative analysis of various image spamming techniques | |
Singh | Advanced machine learning model to detect spam on instagram | |
Khanum et al. | Trends in Combating Image Spam E-mails | |
Parekh et al. | Spam URL detection and image spam filtering using machine learning | |
Shmalko et al. | Profiler: Profile-Based Model to Detect Phishing Emails |