Gattani et al., 2023 - Google Patents
Comparative analysis for email spam detection using machine learning algorithmsGattani et al., 2023
- Document ID
- 17121614155365078859
- Author
- Gattani G
- Mantri S
- Nayak S
- Publication year
- Publication venue
- Modern Electronics Devices and Communication Systems: Select Proceedings of MEDCOM 2021
External Links
Snippet
The prominence of the use of communication over the Internet is increasing progressively. Being economical, faster, and easy user interface, the number of email users is increasing tremendously. These led to the gradually increasing activity of spam. Spam emails are …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/585—Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Gangavarapu et al. | Applicability of machine learning in spam and phishing email filtering: review and approaches | |
| US11509689B2 (en) | Systems and methods for intelligent phishing threat detection and phishing threat remediation in a cyber security threat detection and mitigation platform | |
| US11550908B2 (en) | Method and apparatus for producing a machine learning system for malware prediction in low complexity sensor networks | |
| Mohammad | A lifelong spam emails classification model | |
| US20200234109A1 (en) | Cognitive Mechanism for Social Engineering Communication Identification and Response | |
| US12131121B2 (en) | Detecting information operations campaigns in social media with machine learning | |
| Alperin et al. | Risk prioritization by leveraging latent vulnerability features in a contested environment | |
| Sethi et al. | Spam email detection using machine learning and neural networks | |
| Kumar et al. | Mlspd-machine learning based spam and phishing detection | |
| Dada et al. | A comparative study between naïve Bayes and neural network (MLP) classifier for spam email detection | |
| Roy et al. | Classifying spam emails using artificial intelligent techniques | |
| US11929969B2 (en) | System and method for identifying spam email | |
| Gattani et al. | Comparative analysis for email spam detection using machine learning algorithms | |
| Podorozhniak et al. | Research application of the spam filtering and spammer detection algorithms on social media and messengers | |
| Al Maruf et al. | Ensemble approach to classify spam sms from bengali text | |
| Gupta et al. | A comprehensive comparative study of machine learning classifiers for spam filtering | |
| Shao et al. | A hybrid spam detection method based on unstructured datasets | |
| Chandran et al. | Optimal deep belief network enabled malware detection and classification model | |
| Obaid | Unsupervised approach for email spam filtering using data mining | |
| Lakshmi et al. | Email Guard: Enhancing Security Through Spam Detection | |
| Rashed et al. | A comprehensive review of machine and deep learning approaches for cyber security phishing email detection | |
| Agrawal et al. | OntoSpammer: a two-source ontology-based spam detection using bagging | |
| Kaur et al. | E-mail spam detection using refined mlp with feature selection | |
| Ponnuchamy et al. | Comparative Analysis of Eminent Algorithms for Detecting Ham and Spam Contents in OSN | |
| Jeyanna et al. | A network intrusion detection system using clustering and outlier detection |