38   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Naveed Hussain, Hamid Turab Mirza, Ghulam Rasool, Ibrar Hussain and Mohammad Kaleem    
Online reviews about the purchase of products or services provided have become the main source of users? opinions. In order to gain profit or fame, usually spam reviews are written to promote or demote a few target products or services. This practice is ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Temidayo Oluwatosin Omotehinwa and David Opeoluwa Oyewola    
Unsolicited emails, popularly referred to as spam, have remained one of the biggest threats to cybersecurity globally. More than half of the emails sent in 2021 were spam, resulting in huge financial losses. The tenacity and perpetual presence of the adv... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mohammad Tubishat, Feras Al-Obeidat, Ali Safaa Sadiq and Seyedali Mirjalili    
Spam emails have become a pervasive issue in recent years, as internet users receive increasing amounts of unwanted or fake emails. To combat this issue, automatic spam detection methods have been proposed, which aim to classify emails into spam and non-... ver más
Revista: Computers    Formato: Electrónico

 
en línea
. Safuan,Romi Satria Wahono,Catur Supriyanto     Pág. 148 - 155
Pemanfaatan jaringan internet saat ini berkembang begitu pesatnya, salah satunya adalah pengiriman surat elektronik atau email. Akhir-akhir ini ramai diperbincangkan adanya spam email. Spam email adalah email yang tidak diminta dan tidak diinginkan dari ... ver más
Revista: Journal of Intelligent Systems    Formato: Electrónico

 
en línea
Adel R. Alharbi and Amer Aljaedi    
Twitter is one of the most popular online social networks for spreading propaganda and words in the Arab region. Spammers are now creating rogue accounts to distribute adult content through Arabic tweets that Arabic norms and cultures prohibit. Arab gove... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Wen Zhang, Chaoqi Bu, Taketoshi Yoshida and Siguang Zhang    
Spam reviews are increasingly appearing on the Internet to promote sales or defame competitors by misleading consumers with deceptive opinions. This paper proposes a co-training approach called CoSpa (Co-training for Spam review identification) to identi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ashokkumar Palanivinayagam, Claude Ziad El-Bayeh and Robertas Dama?evicius    
Machine-learning-based text classification is one of the leading research areas and has a wide range of applications, which include spam detection, hate speech identification, reviews, rating summarization, sentiment analysis, and topic modelling. Widely... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Xuanyu Zhang, Hao Zhou, Ke Yu, Xiaofei Wu and Anis Yazidi    
In Natural Language Processing (NLP), deep-learning neural networks have superior performance but pose transparency and explainability barriers, due to their black box nature, and, thus, there is lack of trustworthiness. On the other hand, classical mach... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Ghizlane Hnini, Jamal Riffi, Mohamed Adnane Mahraz, Ali Yahyaouy and Hamid Tairi    
Spammers have created a new kind of electronic mail (e-mail) called image-based spam to bypass text-based spam filters. Unfortunately, these images contain harmful links that can infect the user?s computer system and take a long time to be deleted, which... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Molly Dewis and Thiago Viana    
Using technology to prevent cyber-attacks has allowed organisations to somewhat automate cyber security. Despite solutions to aid organisations, many are susceptible to phishing and spam emails which can make an unwanted impact if not mitigated. Traits t... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Ala? M. Al-Zoubi, Antonio M. Mora and Hossam Faris    
During the recent COVID-19 pandemic, people were forced to stay at home to protect their own and others? lives. As a result, remote technology is being considered more in all aspects of life. One important example of this is online reviews, where the num... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Olga V. Okhlupina,Dmitry S. Murashko     Pág. 17 - 20
Among the common methods of combating spam, a special place is occupied by a probabilistic machine learning algorithm, which is based on the well-known Bayes theorem. The so-called "naive" Bayesian classifier establishes the class of the document by dete... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Raid W. Amin, Hakki Erhan Sevil, Salih Kocak, Guillermo Francia III and Philip Hoover    
In this study, we aimed to identify spatial clusters of countries with high rates of cyber attacks directed at other countries. The cyber attack dataset was obtained from Canadian Institute for Cybersecurity, with over 110,000 Uniform Resource Locators (... ver más
Revista: Information    Formato: Electrónico

 
en línea
Lucky Kannan,Jebakumar R     Pág. pp. 204 - 213
Many businesses use email as a medium for advertising and they use emails to communicate with their customers. In the email world, the most common issue that remains unresolved even now is spamming or in other terms unsolicited bulk email. Currently, the... ver más

 
en línea
Kothai G,Poovammal E     Pág. pp. 33 - 44
Vehicular Adhoc Network (VANET) is an emerging technology that provides a digital communication among vehicles, persons and Road-Side Units (RSU). VANETs are highly vulnerable to cyber-attacks. These cyber-attacks make a wrong illusion on traffic jam, ca... ver más

 
en línea
Asma Baccouche, Sadaf Ahmed, Daniel Sierra-Sosa and Adel Elmaghraby    
Identifying internet spam has been a challenging problem for decades. Several solutions have succeeded to detect spam comments in social media or fraudulent emails. However, an adequate strategy for filtering messages is difficult to achieve, as these me... ver más
Revista: Information    Formato: Electrónico

 
en línea
Abdallah Ghourabi, Mahmood A. Mahmood and Qusay M. Alzubi    
Despite the rapid evolution of Internet protocol-based messaging services, SMS still remains an indisputable communication service in our lives until today. For example, several businesses consider that text messages are more effective than e-mails. This... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Tian Xia and Xuemin Chen    
Many machine learning methods have been applied for short messaging service (SMS) spam detection, including traditional methods such as naïve Bayes (NB), vector space model (VSM), and support vector machine (SVM), and novel methods such as long short-ter... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Zhi-Yuan Zeng, Jyun-Jie Lin, Mu-Sheng Chen, Meng-Hui Chen, Yan-Qi Lan and Jun-Lin Liu    
Consumers? purchase behavior increasingly relies on online reviews. Accordingly, there are more and more deceptive reviews which are harmful to customers. Existing methods to detect spam reviews mainly take the problem as a general text classification ta... ver más
Revista: Information    Formato: Electrónico

 
en línea
Matthew Marko    
The author demonstrates a stable Lagrangian solid modeling method, tracking the interactions of solid mass particles rather than using a meshed grid. This numerical method avoids the problem of tensile instability often seen with smooth particle applied ... ver más
Revista: Computation    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »