E-mail Fraud Detection

نویسندگان

چکیده

Spam issues have become worse on social media platforms and apps with the growth of IoT. To solve problem, researchers suggested several spam detection techniques. rates are still high despite use anti-spam technologies tactics, especially given ubiquity rogue e-mails that lead to dangerous websites. By using up memory or storage space, may cause servers run slowly. One most essential methods for identifying eliminating is filtering e-mails. this end, various deep learning machine been used, including Naive Bayes, decision trees, SVM, random forest. E-mail Internet Things filters approaches systems categorized in research. Additionally, as more people mobile devices SMS services affordable, issue messages spreading worldwide. This study suggests a variety detect get rid solution problem. According trial findings, TF-IDF Random Forest classification algorithm outperformed other examined algorithms accuracy %. It only possible gauge performance since dataset imbalanced. Therefore, must good precision, recall, F-measure.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

E-Mail Worm Detection Using Data Mining

This work applies data mining techniques to detect e-mail worms. E-mail messages contain a number of different features such as the total number of words in message body/subject, presence/absence of binary attachments, type of attachments, and so on. The goal is to obtain an efficient classification model based on these features. The solution consists of several steps. First, the number of feat...

متن کامل

E-mail Viruses Detection: Detect E-mail Virus by Network Traffic

...................................................................................................................................................2

متن کامل

Trap E-mail Address for Combating E-mail Viruses

The biggest infection events show that the most dangerous viruses propagate via the Internet email systems. We propose a new solution to accelerate the identification of infected computers after an attack by e-mail viruses. Our approach uses trap e-mail addresses secured by a feasible cryptographic technique. The novelty of our work is the introduction of virtual e-mail addresses to identify vi...

متن کامل

E E-mail Data Stores

For many people, e-mail has become a running record of their business and personal lives. Somewhere in that big clot of e-mail messages that have accumulated over the years is a wealth of information about people they’ve met, work they’ve done, meetings they’ve held. There are tough calls and tender moments, great debates and funny episodes. When did you first meet a certain person? Just what w...

متن کامل

Phishing E-mail Detection Based on Structural Properties

Phishing attacks pose a serious threat to end-users and commercial institutions alike. Majority of the present day phishing attacks employ e-mail as their primary carrier, in order to allure unsuspecting victims to visit the masqueraded website. While the recent defense mechanisms focus on detection by validating the authenticity of the website, very few approaches have been proposed which conc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of emerging science and engineering

سال: 2023

ISSN: ['2319-6378']

DOI: https://doi.org/10.35940/ijese.b7797.0811923