Works matching DE "SPAM filtering (Email)"
Results: 113
Mining adversarial patterns via regularized loss minimization.
- Published in:
- Machine Learning, 2010, v. 81, n. 1, p. 69, doi. 10.1007/s10994-010-5199-2
- By:
- Publication type:
- Article
To "Opt Out" Go to Court: HOW THE PUBLIC NUISANCE DOCTRINE CAN SOLVE THE ROBOTEXT CIRCUIT SPLIT AND SUPPORT PLAINTIFFS.
- Published in:
- Brooklyn Law Review, 2023, v. 88, n. 2, p. 719
- By:
- Publication type:
- Article
Voting-based Classification for E-mail Spam Detection.
- Published in:
- Journal of ICT Research & Applications, 2016, v. 10, n. 1, p. 29, doi. 10.5614/itbj.ict.res.appl.2016.10.1.3
- By:
- Publication type:
- Article
Framework for Urdu News Headlines Classification.
- Published in:
- Journal of Applied Computer Science & Mathematics, 2016, n. 21, p. 17, doi. 10.4316/JACSM.201601002
- By:
- Publication type:
- Article
WORDS VERSUS CHARACTER N-GRAMS FOR ANTI-SPAM FILTERING.
- Published in:
- International Journal on Artificial Intelligence Tools, 2007, v. 16, n. 6, p. 1047, doi. 10.1142/S0218213007003692
- By:
- Publication type:
- Article
ADAPTIVE SPAM FILTERING USING DYNAMIC FEATURE SPACES.
- Published in:
- International Journal on Artificial Intelligence Tools, 2007, v. 16, n. 4, p. 627, doi. 10.1142/S0218213007003473
- By:
- Publication type:
- Article
IMPROVING THE PERFORMANCE OF ANTI-SPAM FILTERS USING OUT-OF-VOCABULARY STATISTICS.
- Published in:
- INGENIARE - Revista Chilena de Ingeniería, 2009, v. 17, n. 3, p. 386
- By:
- Publication type:
- Article
A review of spam email detection: analysis of spammer strategies and the dataset shift problem.
- Published in:
- Artificial Intelligence Review, 2023, v. 56, n. 2, p. 1145, doi. 10.1007/s10462-022-10195-4
- By:
- Publication type:
- Article
Resources and components for gujarati NLP systems: a survey.
- Published in:
- Artificial Intelligence Review, 2022, v. 55, n. 7, p. 1, doi. 10.1007/s10462-021-10120-1
- By:
- Publication type:
- Article
Applicability of machine learning in spam and phishing email filtering: review and approaches.
- Published in:
- Artificial Intelligence Review, 2020, v. 53, n. 7, p. 5019, doi. 10.1007/s10462-020-09814-9
- By:
- Publication type:
- Article
A survey of image spamming and filtering techniques.
- Published in:
- Artificial Intelligence Review, 2013, v. 40, n. 1, p. 71, doi. 10.1007/s10462-011-9280-4
- By:
- Publication type:
- Article
An Assessment of Case-Based Reasoning for Spam Filtering.
- Published in:
- Artificial Intelligence Review, 2005, v. 24, n. 3/4, p. 359, doi. 10.1007/s10462-005-9006-6
- By:
- Publication type:
- Article
EMAIL SPAM BEHAVIOUR SEIVING TECHNIQUE USING HYBRID ALGORITHM.
- Published in:
- Journal of the Balkan Tribological Association, 2023, v. 29, n. 5, p. 766
- By:
- Publication type:
- Article
CERTAIN INVESTIGATIONS ON COMPARING THE ACCURACY OF MACHINE LEARNING ALGORITHMS IN EMAIL SPAM DETECTIONS.
- Published in:
- Journal of the Balkan Tribological Association, 2023, v. 29, n. 2, p. 219
- By:
- Publication type:
- Article
Sistema de bloqueo automático para páginas web que incitan a la violencia a través de un algoritmo híbrido de aprendizaje computacional.
- Published in:
- Revista Vínculos, 2013, v. 10, n. 2, p. 63
- By:
- Publication type:
- Article
Using Personality Recognition Techniques to Improve Bayesian Spam Filtering.
- Published in:
- Procesamiento del Lenguaje Natural, 2016, v. 57, p. 125
- By:
- Publication type:
- Article
Impact Analysis of Resilience Against Malicious Code Attacks via Emails.
- Published in:
- Computers, Materials & Continua, 2022, v. 72, n. 3, p. 4803, doi. 10.32604/cmc.2022.025310
- By:
- Publication type:
- Article
Online Behaviors Affected by Spam.
- Published in:
- Social Science Computer Review, 2006, v. 24, n. 4, p. 507, doi. 10.1177/0894439306288304
- By:
- Publication type:
- Article
A generic solution for unwanted traffic control through trust management.
- Published in:
- New Review of Hypermedia & Multimedia, 2014, v. 20, n. 1, p. 25, doi. 10.1080/13614568.2013.832807
- By:
- Publication type:
- Article
A Collaborative Abstraction Based Email Spam Filtering with Fingerprints.
- Published in:
- Wireless Personal Communications, 2022, v. 123, n. 2, p. 1913, doi. 10.1007/s11277-021-09221-5
- By:
- Publication type:
- Article
Reinforcement Deep Learning Memetic Algorithm For Detection of Short Messaging Service Spam Using Filters To Curb Insider Threats in Organizations.
- Published in:
- FUPRE Journal of Scientific & Industrial Research, 2023, v. 7, n. 3, p. 20
- By:
- Publication type:
- Article
Adaptive Hybrid Genetic Algorithm Trained Bayesian Network Framework for Spam Filtering Using Text Normalization.
- Published in:
- FUPRE Journal of Scientific & Industrial Research, 2023, v. 7, n. 1, p. 82
- By:
- Publication type:
- Article
Polynomial Neural Networks Versus Other Spam Email Filters: An Empirical Study.
- Published in:
- TEM Journal, 2020, v. 9, n. 1, p. 136, doi. 10.18421/TEM91-19
- By:
- Publication type:
- Article
Collaborative spam filtering based on incremental ontology learning.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 693, doi. 10.1007/s11235-011-9513-5
- By:
- Publication type:
- Article
A New Fine-grain SMS Corpus and Its Corresponding Classifier Using Probabilistic Topic Model.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 2, p. 604, doi. 10.3837/tiis.2018.02.004
- By:
- Publication type:
- Article
Mobile Junk Message Filter Reflecting User Preference.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 11, p. 2849, doi. 10.3837/tiis.2012.11.006
- By:
- Publication type:
- Article
SPLOG! OR HOW TO STOP THE RISE OF A NEW MENACE ON THE INTERNET.
- Published in:
- Harvard Journal of Law & Technology, 2005, v. 19, n. 2, p. 467
- Publication type:
- Article
A Taste of Honey -- UCE (Spam) Reduction through Deception.
- Published in:
- New Zealand Journal of Applied Computing & Information Technology, 2006, v. 10, n. 1, p. 85
- By:
- Publication type:
- Article
Cost-sensitive three-way email spam filtering.
- Published in:
- Journal of Intelligent Information Systems, 2014, v. 42, n. 1, p. 19, doi. 10.1007/s10844-013-0254-7
- By:
- Publication type:
- Article
A general framework for scalable transductive transfer learning.
- Published in:
- Knowledge & Information Systems, 2014, v. 38, n. 1, p. 61, doi. 10.1007/s10115-013-0647-5
- By:
- Publication type:
- Article
Robust personalizable spam filtering via local and global discrimination modeling.
- Published in:
- Knowledge & Information Systems, 2013, v. 34, n. 2, p. 299, doi. 10.1007/s10115-012-0477-x
- By:
- Publication type:
- Article
A hybrid decision tree training method using data streams.
- Published in:
- Knowledge & Information Systems, 2011, v. 29, n. 2, p. 335, doi. 10.1007/s10115-010-0345-5
- By:
- Publication type:
- Article
A Classification Method for E-mail Spam Using a Hybrid Approach for Feature Selection Optimization.
- Published in:
- Journal of Sciences, Islamic Republic of Iran, 2020, v. 31, n. 2, p. 165
- By:
- Publication type:
- Article
Application of Natural Language Processing and Machine Learning Boosted with Swarm Intelligence for Spam Email Filtering.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 22, p. 4173, doi. 10.3390/math10224173
- By:
- Publication type:
- Article
Lessons from the Storm: Contingency Plans.
- Published in:
- Journal of the CPA Practitioner, 2011, v. 3, n. 4, p. 10
- By:
- Publication type:
- Article
E-mail Essentials.
- Published in:
- Journal of the CPA Practitioner, 2010, v. 2, n. 3, p. 7
- By:
- Publication type:
- Article
An efficient incremental learning mechanism for tracking concept drift in spam filtering.
- Published in:
- PLoS ONE, 2017, v. 12, n. 2, p. 1, doi. 10.1371/journal.pone.0171518
- By:
- Publication type:
- Article
Novel email spam detection method using sentiment analysis and personality recognition.
- Published in:
- Logic Journal of the IGPL, 2020, v. 28, n. 1, p. 83, doi. 10.1093/jigpal/jzz073
- By:
- Publication type:
- Article
Collective classification for spam filtering.
- Published in:
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 540, doi. 10.1093/jigpal/jzs030
- By:
- Publication type:
- Article
Why Don't We Encrypt Our Email?
- Published in:
- IEEE Internet Computing, 2009, v. 13, n. 1, p. 82, doi. 10.1109/MIC.2009.25
- By:
- Publication type:
- Article
Semantic Email Addressing: The Semantic Web Killer App?
- Published in:
- IEEE Internet Computing, 2009, v. 13, n. 1, p. 48, doi. 10.1109/MIC.2009.20
- By:
- Publication type:
- Article
News in Brief.
- Published in:
- IEEE Internet Computing, 2008, v. 12, n. 5, p. 12
- Publication type:
- Article
Fighting Spam on Social Web Sites.
- Published in:
- IEEE Internet Computing, 2007, v. 11, n. 6, p. 38, doi. 10.1109/MIC.2007.125
- By:
- Publication type:
- Article
Semantic Attention Management.
- Published in:
- IEEE Internet Computing, 2006, v. 10, n. 5, p. 93, doi. 10.1109/MIC.2006.110
- By:
- Publication type:
- Article
Filtering artificial texts with statistical machine learning techniques.
- Published in:
- Language Resources & Evaluation, 2011, v. 45, n. 1, p. 25, doi. 10.1007/s10579-009-9113-0
- By:
- Publication type:
- Article
Blocking negative influential node set in social networks: from host perspective.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2017, v. 28, n. 4, p. n/a, doi. 10.1002/ett.3007
- By:
- Publication type:
- Article
Spam image email filtering using K-NN and SVM.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2019, v. 9, n. 1, p. 245, doi. 10.11591/ijece.v9i1.pp245-254
- By:
- Publication type:
- Article
Adaptive SVM for Data Stream Classification.
- Published in:
- South African Computer Journal, 2017, v. 29, n. 1, p. 27, doi. 10.18489/sacj.v29i1.414
- By:
- Publication type:
- Article
THE SPAM FILTER ATE MY E-MAIL: WHEN ARE ELECTRONIC RECORDS RECEIVED?
- Published in:
- William Mitchell Law Review, 2013, v. 39, n. 4, p. 1295
- By:
- Publication type:
- Article
THE SPAM FILTER ATE MY E-MAIL: WHEN ARE ELECTRONIC RECORDS RECEIVED?
- Published in:
- William Mitchell Law Review, 2012, v. 38, n. 4, p. 1295
- By:
- Publication type:
- Article