A survey of emerging approaches to spam filtering

G Caruana, M Li - ACM computing surveys (CSUR), 2008 - dl.acm.org
From just an annoying characteristic of the electronic mail epoch, spam has evolved into an
expensive resource and time-consuming problem. In this survey, we focus on emerging …

A survey of image spamming and filtering techniques

A Attar, RM Rad, RE Atani - Artificial Intelligence Review, 2013 - Springer
Many techniques have been proposed to combat the upsurge in image-based spam. All the
proposed techniques have the same target, trying to avoid the image spam entering our …

An ontology enhanced parallel SVM for scalable spam filter training

G Caruana, M Li, Y Liu - Neurocomputing, 2013 - Elsevier
Spam, under a variety of shapes and forms, continues to inflict increased damage. Varying
approaches including Support Vector Machine (SVM) techniques have been proposed for …

Content based spam e-mail filtering

P Liu, TS Moh - 2016 International Conference on Collaboration …, 2016 - ieeexplore.ieee.org
Currently, E-mail is one of the most important methods of communication. However, the
increasing of spam e-mails causes traffic congestion, decreasing productivity, phishing …

A hybrid spam detection method based on unstructured datasets

Y Shao, M Trovati, Q Shi, O Angelopoulou… - Soft Computing, 2017 - Springer
The identification of non-genuine or malicious messages poses a variety of challenges due
to the continuous changes in the techniques utilised by cyber-criminals. In this article, we …

A Non-genuine Message Detection Method Based on Unstructured Datasets

M Trovati, R Hill, N Bessis - … on P2P, Parallel, Grid, Cloud and …, 2015 - ieeexplore.ieee.org
The identification of non-genuine or malicious messages poses a variety of challenges due
to the continuous changes in the techniques utilised by cyber-criminals. In this article, we …

Detecting spammers via aggregated historical data set

E Menahem, R Pusiz, Y Elovici - … , Fujian, China, November 21-23, 2012 …, 2012 - Springer
In this work we propose a new sender reputation mechanism that is based on an
aggregated historical dataset, which encodes the behavior of mail transfer agents over …

[PDF][PDF] A Study on Spam Detection Methods for Safe SMS Communication

S Bhatia - International Journal of Engineering & Technology, 2018 - academia.edu
The electronic communication enables the instant and all type availability of user. The
different form of information transition can be drawn in the form of SMS and emails. But these …

MapReduce based RDF assisted distributed SVM for high throughput spam filtering

G Caruana - 2013 - bura.brunel.ac.uk
Electronic mail has become cast and embedded in our everyday lives. Billions of legitimate
emails are sent on a daily basis. The widely established underlying infrastructure, its …

[PDF][PDF] Document Version

Y Shao, M Trovati, Q Shi, O Angelopoulou - Computing, 2017 - core.ac.uk
The identification of non-genuine or malicious messages poses a variety of challenges due
to the continuous changes in the techniques utilised by cyber-criminals. In this article, we …