[HTML][HTML] An intelligent spam detection model based on artificial immune system

AJ Saleh, A Karim, B Shanmugam, S Azam… - Information, 2019 - mdpi.com
Spam emails, also known as non-self, are unsolicited commercial or malicious emails, sent
to affect either a single individual or a corporation or a group of people. Besides advertising …

Efficient spam filtering through intelligent text modification detection using machine learning

N Mageshkumar, A Vijayaraj, N Arunpriya… - Materials Today …, 2022 - Elsevier
Spam emails have long been a source of concern in the field of computer security. They are
both monetarily and technologically costly, as well as extremely harmful to computers and …

Identification of spoofed emails by applying email forensics and memory forensics

S Shukla, M Misra, G Varshney - Proceedings of the 2020 10th …, 2020 - dl.acm.org
Email forensics is the subdomain of network forensics, and email spoofing is the most
common type of email attack. Email spoofing is a process of creating a forged message by …

Email spoofing detection using volatile memory forensics

RP Iyer, PK Atrey, G Varshney… - 2017 IEEE Conference …, 2017 - ieeexplore.ieee.org
In email systems, one of the most widely used attacks is email spoofing, in which the source
address of the email message is forged to make the recipient of the email believe that the …

Forensic analysis and detection of spoofing based email attack using memory forensics and machine learning

S Shukla, M Misra, G Varshney - … Conference on Security and Privacy in …, 2022 - Springer
Emails encounter many types of cyber-attacks and email spoofing is one of the most
common and challenging investigation problems. This paper identifies spoofing-based …

Advanced analysis of email sender spoofing attack and related security problems

B Yu, P Li, J Liu, Z Zhou, Y Han… - 2022 IEEE 9th …, 2022 - ieeexplore.ieee.org
A mail spoofing attack is a harmful activity that modifies the source of the mail and trick users
into believing that the message originated from a trusted sender whereas the actual sender …

Spoofed Email Based Cyberattack Detection Using Machine Learning

S Shukla, M Misra, G Varshney - Journal of Computer Information …, 2023 - Taylor & Francis
Cyberattacks on e-mails are of different types, but the most pervasive and ubiquitous are
spoofing attacks. Our approach uses memory forensics to extract e-mail headers from live …

Development of anti-spam technique using modified K-Means & Naive Bayes algorithm

DK Tayal, A Jain, K Meena - 2016 3rd International Conference …, 2016 - ieeexplore.ieee.org
In recent years, the issues of expanding spam mail on the web has turned into a major issue
and has also become difficult to detect. Junk mails or unsolicited bulk emails are known as …

Browshing a new way of phishing using a malicious browser extension

G Varshney, M Misra, P Atrey - 2017 Innovations in Power and …, 2017 - ieeexplore.ieee.org
Phishing is a well-known cybercrime. It is performed using various tricks and techniques
including email spoofing, exploiting browser vulnerabilities, web spoofing, DNS poisoning …

Spam filtering with sender authentication network

G Dalkılıç, D Sipahi - Computer Communications, 2017 - Elsevier
Unsolicited commercial and non-commercial e-mails occupy the Internet bandwidth
redundantly, as well as the recipient's time and energy. In the fight against those spam e …