[go: up one dir, main page]

Ketari et al., 2012 - Google Patents

A study of image spam filtering techniques

Ketari et al., 2012

Document ID
15302658999453479582
Author
Ketari L
Chandra M
Khanum M
Publication year
Publication venue
2012 Fourth International Conference on Computational Intelligence and Communication Networks

External Links

Snippet

Nowadays, Internet is becoming an incontestable communication mean of choice, through emails, for both professional and personal correspondences. However, emails are not only, efficient, cheap, and rapid mean of communication, but also are becoming favourite lucrative …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/30707Clustering or classification into predefined classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/107Computer aided management of electronic mail
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/585Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities

Similar Documents

Publication Publication Date Title
Chiew et al. Utilisation of website logo for phishing detection
Biggio et al. A survey and experimental evaluation of image spam filtering techniques
Wang et al. Filtering image spam with near-duplicate detection.
Dredze et al. Learning fast classifiers for image spam.
Zareapoor et al. Feature extraction or feature selection for text classification: A case study on phishing email detection
Islam et al. A multi-tier phishing detection and filtering approach
Attar et al. A survey of image spamming and filtering techniques
Mohammed et al. Adaptive intelligent learning approach based on visual anti-spam email model for multi-natural language
Vinayakumar et al. Deep learning framework for cyber threat situational awareness based on email and url data analysis
Kumar Birthriya et al. A comprehensive survey of phishing email detection and protection techniques
Ketari et al. A study of image spam filtering techniques
Rayan Analysis of e‐Mail Spam Detection Using a Novel Machine Learning‐Based Hybrid Bagging Technique
Das et al. Analysis of an image spam in email based on content analysis
Hayati et al. Evaluation of spam detection and prevention frameworks for email and image spam: a state of art
Shyni et al. A multi-classifier based prediction model for phishing emails detection using topic modelling, named entity recognition and image processing
Nivedha et al. Detection of email spam using Natural Language Processing based Random Forest approach
Obaid Unsupervised approach for email spam filtering using data mining
Sivanantham et al. Web Hazard Identification and Detection Using Deep Learning-A Comparative Study.
Divakarla et al. Predicting Phishing Emails and Websites to Fight Cybersecurity Threats Using Machine Learning Algorithms
Wang et al. Image spam classification based on low-level image features
Kumar et al. Study and comparative analysis of various image spamming techniques
Singh Advanced machine learning model to detect spam on instagram
Khanum et al. Trends in Combating Image Spam E-mails
Parekh et al. Spam URL detection and image spam filtering using machine learning
Shmalko et al. Profiler: Profile-Based Model to Detect Phishing Emails