2007 IEEE Intelligence and Security Informatics 2007
DOI: 10.1109/isi.2007.379491
|View full text |Cite
|
Sign up to set email alerts
|

Association Rule Mining for Suspicious Email Detection: A Data Mining Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0
1

Year Published

2011
2011
2018
2018

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 5 publications
0
13
0
1
Order By: Relevance
“…Criminals these days are becoming technologically intelligent in planning and committing crimes [6]. E-mail has become one of the popular means of communication.…”
Section: Introductionmentioning
confidence: 99%
“…Criminals these days are becoming technologically intelligent in planning and committing crimes [6]. E-mail has become one of the popular means of communication.…”
Section: Introductionmentioning
confidence: 99%
“…A study by Appavu et al [5] applied the association rule mining for suspicious email detection task. In the article [5], the authors added a specialized class of suspicious emails as an alert or the information using verb.…”
Section: Suspicious Email Detectionmentioning
confidence: 99%
“…In the article [5], the authors added a specialized class of suspicious emails as an alert or the information using verb. An email is considered suspicious if in addition to keywords it contains future tenses to consider it as an alarm for future suspicious activity.…”
Section: Suspicious Email Detectionmentioning
confidence: 99%
See 2 more Smart Citations