|
|
|
Naveed Hussain, Hamid Turab Mirza, Ghulam Rasool, Ibrar Hussain and Mohammad Kaleem
Online reviews about the purchase of products or services provided have become the main source of users? opinions. In order to gain profit or fame, usually spam reviews are written to promote or demote a few target products or services. This practice is ...
ver más
|
|
|
|
|
|
|
Temidayo Oluwatosin Omotehinwa and David Opeoluwa Oyewola
Unsolicited emails, popularly referred to as spam, have remained one of the biggest threats to cybersecurity globally. More than half of the emails sent in 2021 were spam, resulting in huge financial losses. The tenacity and perpetual presence of the adv...
ver más
|
|
|
|
|
|
|
Mohammad Tubishat, Feras Al-Obeidat, Ali Safaa Sadiq and Seyedali Mirjalili
Spam emails have become a pervasive issue in recent years, as internet users receive increasing amounts of unwanted or fake emails. To combat this issue, automatic spam detection methods have been proposed, which aim to classify emails into spam and non-...
ver más
|
|
|
|
|
|
|
. Safuan,Romi Satria Wahono,Catur Supriyanto
Pág. 148 - 155
Pemanfaatan jaringan internet saat ini berkembang begitu pesatnya, salah satunya adalah pengiriman surat elektronik atau email. Akhir-akhir ini ramai diperbincangkan adanya spam email. Spam email adalah email yang tidak diminta dan tidak diinginkan dari ...
ver más
|
|
|
|
|
|
|
Adel R. Alharbi and Amer Aljaedi
Twitter is one of the most popular online social networks for spreading propaganda and words in the Arab region. Spammers are now creating rogue accounts to distribute adult content through Arabic tweets that Arabic norms and cultures prohibit. Arab gove...
ver más
|
|
|
|
|
|
|
Wen Zhang, Chaoqi Bu, Taketoshi Yoshida and Siguang Zhang
Spam reviews are increasingly appearing on the Internet to promote sales or defame competitors by misleading consumers with deceptive opinions. This paper proposes a co-training approach called CoSpa (Co-training for Spam review identification) to identi...
ver más
|
|
|
|
|
|
|
Ashokkumar Palanivinayagam, Claude Ziad El-Bayeh and Robertas Dama?evicius
Machine-learning-based text classification is one of the leading research areas and has a wide range of applications, which include spam detection, hate speech identification, reviews, rating summarization, sentiment analysis, and topic modelling. Widely...
ver más
|
|
|
|
|
|
|
Xuanyu Zhang, Hao Zhou, Ke Yu, Xiaofei Wu and Anis Yazidi
In Natural Language Processing (NLP), deep-learning neural networks have superior performance but pose transparency and explainability barriers, due to their black box nature, and, thus, there is lack of trustworthiness. On the other hand, classical mach...
ver más
|
|
|
|
|
|
|
Ghizlane Hnini, Jamal Riffi, Mohamed Adnane Mahraz, Ali Yahyaouy and Hamid Tairi
Spammers have created a new kind of electronic mail (e-mail) called image-based spam to bypass text-based spam filters. Unfortunately, these images contain harmful links that can infect the user?s computer system and take a long time to be deleted, which...
ver más
|
|
|
|
|
|
|
Molly Dewis and Thiago Viana
Using technology to prevent cyber-attacks has allowed organisations to somewhat automate cyber security. Despite solutions to aid organisations, many are susceptible to phishing and spam emails which can make an unwanted impact if not mitigated. Traits t...
ver más
|
|
|
|
|
|
|
Ala? M. Al-Zoubi, Antonio M. Mora and Hossam Faris
During the recent COVID-19 pandemic, people were forced to stay at home to protect their own and others? lives. As a result, remote technology is being considered more in all aspects of life. One important example of this is online reviews, where the num...
ver más
|
|
|
|
|
|
|
Olga V. Okhlupina,Dmitry S. Murashko
Pág. 17 - 20
Among the common methods of combating spam, a special place is occupied by a probabilistic machine learning algorithm, which is based on the well-known Bayes theorem. The so-called "naive" Bayesian classifier establishes the class of the document by dete...
ver más
|
|
|
|
|
|
|
Raid W. Amin, Hakki Erhan Sevil, Salih Kocak, Guillermo Francia III and Philip Hoover
In this study, we aimed to identify spatial clusters of countries with high rates of cyber attacks directed at other countries. The cyber attack dataset was obtained from Canadian Institute for Cybersecurity, with over 110,000 Uniform Resource Locators (...
ver más
|
|
|
|
|
|
|
Lucky Kannan,Jebakumar R
Pág. pp. 204 - 213
Many businesses use email as a medium for advertising and they use emails to communicate with their customers. In the email world, the most common issue that remains unresolved even now is spamming or in other terms unsolicited bulk email. Currently, the...
ver más
|
|
|
|
|
|
|
Kothai G,Poovammal E
Pág. pp. 33 - 44
Vehicular Adhoc Network (VANET) is an emerging technology that provides a digital communication among vehicles, persons and Road-Side Units (RSU). VANETs are highly vulnerable to cyber-attacks. These cyber-attacks make a wrong illusion on traffic jam, ca...
ver más
|
|
|
|
|
|
|
Asma Baccouche, Sadaf Ahmed, Daniel Sierra-Sosa and Adel Elmaghraby
Identifying internet spam has been a challenging problem for decades. Several solutions have succeeded to detect spam comments in social media or fraudulent emails. However, an adequate strategy for filtering messages is difficult to achieve, as these me...
ver más
|
|
|
|
|
|
|
Abdallah Ghourabi, Mahmood A. Mahmood and Qusay M. Alzubi
Despite the rapid evolution of Internet protocol-based messaging services, SMS still remains an indisputable communication service in our lives until today. For example, several businesses consider that text messages are more effective than e-mails. This...
ver más
|
|
|
|
|
|
|
Tian Xia and Xuemin Chen
Many machine learning methods have been applied for short messaging service (SMS) spam detection, including traditional methods such as naïve Bayes (NB), vector space model (VSM), and support vector machine (SVM), and novel methods such as long short-ter...
ver más
|
|
|
|
|
|
|
Zhi-Yuan Zeng, Jyun-Jie Lin, Mu-Sheng Chen, Meng-Hui Chen, Yan-Qi Lan and Jun-Lin Liu
Consumers? purchase behavior increasingly relies on online reviews. Accordingly, there are more and more deceptive reviews which are harmful to customers. Existing methods to detect spam reviews mainly take the problem as a general text classification ta...
ver más
|
|
|
|
|
|
|
Matthew Marko
The author demonstrates a stable Lagrangian solid modeling method, tracking the interactions of solid mass particles rather than using a meshed grid. This numerical method avoids the problem of tensile instability often seen with smooth particle applied ...
ver más
|
|
|
|