Email Representation using Noncharacteristic Information and its Application

نویسندگان

  • Pei-yu Liu
  • Jing Zhao
  • Zhen-fang Zhu
چکیده

Focusing on the uncertainty of classifying emails based-on email content and the incompleteness of email representation, the paper proposes a new representation using noncharacteristic information. The new approach refers to the whole email, contains feature items extracted from email content, and noncharacteristic items extracted from email header. In the expriment, we adopt Naïve Bayes classifier to classify emails, classification results indicate that the new approach overcomes the shortcomings of original content-based filtering and improves the recall and the precision of spam filtering.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Horizontal representation of a hesitant fuzzy set and its application to multiple attribute decision making

The main aim of this paper is to present a novel method for ranking hesitant fuzzy sets (HFSs) based on transforming HFSs into fuzzy sets (FSs). The idea behind the method is an interesting HFS decomposition which is referred here to as the horizontal representation in the current study. To show the validity of the proposed ranking method, we apply it to solve a multi-attribute decision-making ...

متن کامل

Pointwise Green Function Bounds and Long-Time Stability of Large-Amplitude Noncharacteristic Boundary Layers

Using pointwise semigroup techniques of Zumbrun–Howard and Mascia–Zumbrun, we obtain sharp global pointwise Green function bounds for noncharacteristic boundary layers of arbitrary amplitude. These estimates allow us to analyze linearized and nonlinearized stability of noncharacteristic boundary layers of one-dimensional systems of conservation laws, showing that both are equivalent to a numeri...

متن کامل

A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors

Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...

متن کامل

Explaining the Methods of Architecture Representation Using Semiotic Analysis (Umberto Eco's Theory of Architecture Codes)

: In this paper, it is tried to explain the concept of representation and architectural representation through a qualitative methodology, approach its procedure for gradual creation in architecture and then according to scholars and to obtain the effect of this concept in the process of architectural facts the concepts are presented. In addition, it is referred to theories and practical texts b...

متن کامل

A new method for accelerating impossible differential cryptanalysis and its application on LBlock

Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCIT

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2010