A comprehensive survey for intelligent spam email detection

A Karim, S Azam, B Shanmugam, K Kannoorpatti… - Ieee …, 2019 - ieeexplore.ieee.org
The tremendously growing problem of phishing e-mail, also known as spam including spear
phishing or spam borne malware, has demanded a need for reliable intelligent anti-spam e …

A spam email detection mechanism for English language text emails using deep learning approach

S Kaddoura, O Alfandi… - 2020 IEEE 29th …, 2020 - ieeexplore.ieee.org
Phishing emails are emails that pretend to be from a trusted company that target users to
provide personal or financial information. Sometimes, they include links that may download …

DynamIPs: Analyzing address assignment practices in IPv4 and IPv6

R Padmanabhan, JP Rula, P Richter… - Proceedings of the 16th …, 2020 - dl.acm.org
IP addresses are commonly used to identify hosts or properties of hosts. The address
assigned to a host may change, however, and the extent to which these changes occur in …

Content based spam detection in email using Bayesian classifier

SB Rathod, TM Pattewar - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Internet provides Emails as means of data communication. Email messaging is an essential
contribution. Hacking attacks, phishing attacks and malicious attack are frequently undergo …

Centralized validation of email senders via EHLO name and IP address targeting

PM Goldstein - US Patent 9,762,618, 2017 - Google Patents
ABSTRACT A DNS server receives from a receiving email system, a DNS query for an email
domain stored at the DNS server, the DNS query including identifying information of a …

{PrivateEye}: Scalable and {Privacy-Preserving} Compromise Detection in the Cloud

B Arzani, S Ciraci, S Saroiu, A Wolman… - … USENIX Symposium on …, 2020 - usenix.org
Today, it is difficult for operators to detect compromised VMs in their data centers (DCs).
Despite their benefits, the compromise detection systems operators offer are mostly unused …

Dabr: Dynamic attribute-based reputation scoring for malicious ip address detection

A Renjan, KP Joshi, SN Narayanan… - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
To effectively identify and filter out attacks from known sources like botnets, spammers, virus
infected systems etc., organizations increasingly procure services that determine the …

Automatic moderation of online discussion sites

JY Delort, B Arunasalam, C Paris - International Journal of …, 2011 - Taylor & Francis
Online discussion sites are plagued with various types of unwanted content, such as spam
and obscene or malicious messages. Prevention and detection-based techniques have …

Sandi: A system for accountability and applications in direct communication

FB Durak, K Laine, S Langowski… - arXiv preprint arXiv …, 2024 - arxiv.org
We construct a system, Sandi, to bring trust in online communication between parties that
share little or no context. Sandi is based on a unique``somewhat monotone''privacy …

Graph neural networks and cross-protocol analysis for detecting malicious IP addresses

Y Huang, J Negrete, J Wagener, C Fralick… - Complex & Intelligent …, 2023 - Springer
An internet protocol (IP) address is the foundation of the Internet, allowing connectivity
between people, servers, Internet of Things, and services across the globe. Knowing what is …