Spam-detection with comparative analysis and spamming words extractions

MK Islam, M Al Amin, MR Islam… - … (Trends and Future …, 2021 - ieeexplore.ieee.org
Communication through email plays an essential part especially in every sector of our day-to-
day life. Considering its significance, it is important to filter spam emails from emails. Spam …

Detecting illegal online gambling (IOG) services in the mobile environment

M Min, JJ Lee, K Lee - Security and Communication Networks, 2022 - Wiley Online Library
Despite the extensive ramifications of illegal online gambling (IOG) services, actions taken
by government authorities have had little effect in halting these operations. In order to …

Curated datasets and feature analysis for phishing email detection with machine learning

AI Champa, MF Rabbi, MF Zibran - 2024 IEEE 3rd International …, 2024 - ieeexplore.ieee.org
Despite continued research, phishing email attacks are on the rise and there is a lack of rich
curated datasets for training and testing email filtering techniques. To address this, we …

Phishy? detecting phishing emails using ml and nlp

MF Rabbi, AI Champa, MF Zibran - 2023 IEEE/ACIS 21st …, 2023 - ieeexplore.ieee.org
Phishing emails, a type of cyberattack using fake emails, are difficult to recognize due to
sophisticated techniques employed by attackers. In this paper, we use a natural language …

[PDF][PDF] Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN.

M Nadeem, A Arshad, S Riaz, SW Zahra… - … , Materials & Continua, 2023 - researchgate.net
Cloud computing is one of the most attractive and cost-saving models, which provides online
services to end-users. Cloud computing allows the user to access data directly from any …

A Bottom-Up Generic Probabilistic Building and Enriching Approach for Knowledge Graph Using the LDA-Based Clustering Method

A Mechergui, S Zghal, WBA Karaa - Software Engineering and …, 2024 - Springer
The world's knowledge appears to be limitless, making it appear impossible to ever fully
comprehend it. Therefore, methods that autonomously infer new knowledge and enrich the …

Phishy? Detecting Phishing Emails Using Machine Learning and Natural Language Processing

MF Rabbi, AI Champa, MF Zibran - Software Engineering and …, 2024 - Springer
Phishing emails, a type of cyberattack using fake emails, are difficult to recognize due to
sophisticated techniques employed by attackers. In this paper, we use a natural language …

Knowledge graph-based Korean new words detection mechanism for spam filtering

J Kim, O Jeong - Journal of Internet Computing and Services, 2020 - koreascience.kr
Today, to block spam texts on smartphone, a simple string comparison between text
messages and spam keywords or a blocking spam phone numbers is used. As results, spam …

Motivational quotes-based intelligent insider threat prediction model

SV Dhavale - Confluence of AI, Machine, and Deep Learning in …, 2021 - igi-global.com
Insiders are considered as the weakest link. The digital records of a person's Facebook likes
against motivational quotes can be used for automatic and accurate prediction of sensitive …