[HTML][HTML] Machine learning techniques for spam detection in email and IoT platforms: analysis and research challenges

N Ahmed, R Amin, H Aldabbas, D Koundal… - Security and …, 2022 - hindawi.com
Nowaday, emails are used in almost every field, from business to education. Emails have
two subcategories, ie, ham and spam. Email spam, also called junk emails or unwanted …

Machine Learning for SPAM Detection

P Teja Nallamothu… - Asian Journal of …, 2023 - eprint.subtopublish.com
In practically every industry today, from business to education, emails/messages are used.
Ham and spam are the two subcategories of emails/messages. Email or message spam …

IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges

P Anand, Y Singh, A Selwal, M Alazab, S Tanwar… - IEEE …, 2020 - ieeexplore.ieee.org
Over the last few decades, sustainable computing has been widely used in areas like social
computing, artificial intelligence-based agent systems, mobile computing, and Internet of …

A literature study on machine learning fusion with IOT

K Sharma, R Nandal - … on Trends in Electronics and Informatics …, 2019 - ieeexplore.ieee.org
In the present era of rapidly growing mature technologies and their inter-connection with
hardware devices and software applications plays a vital role for the emergence of different …

Analyzing host security using D‐S evidence theory and multisource information fusion

Y Li, S Yao, R Zhang, C Yang - International Journal of …, 2021 - Wiley Online Library
Security monitoring and analysis can help users to timely perceive threats faced by the host,
thereby protecting and backup data and improving the host's security status. In the research …

An empirical study of supervised email classification in Internet of Things: practical performance and key influencing factors

W Li, L Ke, W Meng, J Han - International Journal of Intelligent …, 2022 - Wiley Online Library
Abstract Internet of Things (IoT) is gradually adopted by many organizations to facilitate the
information collection and sharing. In an organization, an IoT node usually can receive and …

Boosting training for PDF malware classifier via active learning

Y Li, X Wang, Z Shi, R Zhang, J Xue… - International Journal of …, 2022 - Wiley Online Library
Abstract Machine learning algorithms are widely used for cybersecurity applications, include
spam, malware detection. In these applications, the machine learning model has to face …

Email spam detection using hierarchical attention hybrid deep learning method

S Zavrak, S Yilmaz - Expert Systems with Applications, 2023 - Elsevier
Email is one of the most widely used ways to communicate, with millions of people and
businesses relying on it to communicate and share knowledge and information on a daily …

A feedback semi-supervised learning with meta-gradient for intrusion detection

S Cai, D Han, D Li - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
The widespread popularity of the Internet of human life has been accompanied by a
significant increase in the cost of protecting private data from malicious attacks. Researchers …

Opponent portrait for multiagent reinforcement learning in competitive environment

Y Ma, M Shen, Y Zhao, Z Li, X Tong… - … Journal of Intelligent …, 2021 - Wiley Online Library
Existing investigations of opponent modeling and intention inferencing cannot make clear
descriptions and practical explanations of the opponent's behaviors and intentions, which …