2015 International Joint Conference on Neural Networks (IJCNN) 2015
DOI: 10.1109/ijcnn.2015.7280826
|View full text |Cite
|
Sign up to set email alerts
|

An autonomous online malicious spam email detection system using extended RBF network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Various techniques have been introduced for identifying spams, including statistical techniques, expert systems, Bayesian networks, neural networks, fuzzy logic, and collective intelligence algorithms. A Radial Basis Function (RBF) model is set forward alongside with Support Vector Machines (SVM) technique for identifying spam emails in [9]. RBF, an artificial neural network model, is used for training and testing data; and SVM, a classification technique, is used for mapping the features.…”
Section: Related Workmentioning
confidence: 99%
“…Various techniques have been introduced for identifying spams, including statistical techniques, expert systems, Bayesian networks, neural networks, fuzzy logic, and collective intelligence algorithms. A Radial Basis Function (RBF) model is set forward alongside with Support Vector Machines (SVM) technique for identifying spam emails in [9]. RBF, an artificial neural network model, is used for training and testing data; and SVM, a classification technique, is used for mapping the features.…”
Section: Related Workmentioning
confidence: 99%
“…Classification is also an application of supervised machine learning, where a certain procedure will enable a machine to learn B Walid Mohamed Aly walid.ali@aast.edu 1 College of Computing and Information Technology, Arab Academy for Science, Technology & Maritime Transport, Alexandria, Egypt from a training data set with each record that was previously labeled, and this is known as the training phase. The output of the training phase will be a well-defined classifier that can be used to predict the class of a new record that was not exposed during training.…”
Section: Introductionmentioning
confidence: 99%
“…Applications of classification span a wide range; it has been applied to problems like spam e-mail detection [1], cancer classification [2] and image classification [3].…”
Section: Introductionmentioning
confidence: 99%