A systematic literature review on spam content detection and classification
The presence of spam content in social media is tremendously increasing, and therefore the
detection of spam has become vital. The spam contents increase as people extensively use …
detection of spam has become vital. The spam contents increase as people extensively use …
Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach
Internet of things (IoT) is a technology that enables our daily life objects to connect on the
Internet and to send and receive data for a meaningful purpose. In recent years, IoT has led …
Internet and to send and receive data for a meaningful purpose. In recent years, IoT has led …
Spam detection through feature selection using artificial neural network and sine–cosine algorithm
Detection of spam and non-spam emails is considered a great challenge for email service
providers and users alike. Spam emails waste the Internet traffic and also contain malicious …
providers and users alike. Spam emails waste the Internet traffic and also contain malicious …
Transfer learning-based forensic analysis and classification of e-mail content
Email has been a dependable, secure, and official communication medium. People's
dependence on email has increased as people have gained confidence in its reliability and …
dependence on email has increased as people have gained confidence in its reliability and …
BigSet: An Efficient Set Intersection Approach
Set intersection is a fundamental operation in many applications, such as common neighbor
computation in graph-based algorithms, set similarity computation, item recommendation …
computation in graph-based algorithms, set similarity computation, item recommendation …
[PDF][PDF] Botnet attack detection in internet of things using optimization techniques
S Rethinavalli, R Gopinath - International Journal of Electrical …, 2020 - researchgate.net
The corporation is currently operating in a hyper-connected world in which scores of
heterogeneous devices are constantly sharing information in a variety of application …
heterogeneous devices are constantly sharing information in a variety of application …
Class‐index corpus‐index measure: A novel feature selection method for imbalanced text data
B Parlak - Concurrency and Computation: Practice and …, 2022 - Wiley Online Library
In the field of text classification, some of the datasets are unbalanced datasets. In these
datasets, feature selection stage is important to increase performance. There are many …
datasets, feature selection stage is important to increase performance. There are many …
Detecting illegal online gambling (IOG) services in the mobile environment
Despite the extensive ramifications of illegal online gambling (IOG) services, actions taken
by government authorities have had little effect in halting these operations. In order to …
by government authorities have had little effect in halting these operations. In order to …
Spam email classification and sentiment analysis based on semantic similarity methods
U Srinivasarao, A Sharaff - International Journal of …, 2023 - inderscienceonline.com
Electronic mail has widely been used for communication purposes, and the spam filter is
required in the e-mail to save storage and protect from security issues. Various techniques …
required in the e-mail to save storage and protect from security issues. Various techniques …
Analyzing the past, improving the future: a multiscale opinion tracking model for optimizing business performance
The complexity of business decision-making has increased over the years. It is essential for
managers to gain a confident understanding of their business environments in order to make …
managers to gain a confident understanding of their business environments in order to make …