2021
DOI: 10.1007/978-981-16-6636-0_50
|View full text |Cite
|
Sign up to set email alerts
|

Improved Spam Email Filtering Architecture Using Several Feature Extraction Techniques

Abstract: Research on spam email filtering is drawing experts from all over the world, as these junk email messages continue to affect people's daily lives, whether consciously or unconsciously. The overwhelming use of irritating, destructive, and misleading emails appears to have damaged the values of email which prompted us to perform this research to construct a model for spam filtering with faster training time and enhanced accuracy. We have proposed two voting architectures built upon machine learning models and en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Prosun, Alam, and Bhowmik [65] discussed two voting architectures based on ML models and ensemble classifiers. The authors investigated the performance of numerous ensemble approaches and individual classifiers utilizing various feature retrieval algorithms.…”
Section: Research Papers Published In 2022mentioning
confidence: 99%
“…Prosun, Alam, and Bhowmik [65] discussed two voting architectures based on ML models and ensemble classifiers. The authors investigated the performance of numerous ensemble approaches and individual classifiers utilizing various feature retrieval algorithms.…”
Section: Research Papers Published In 2022mentioning
confidence: 99%
“…The most prevalent phishing email detection algorithms are supervised approaches, such as support vector machines (SVM) [44]- [50], logistic regression (LR) [44], [45], [48], [51]- [56], Decision Tree (DT) [48]- [50], [57]- [62], and Naïve Bayes (NB) [44], [63]- [65]. Unsupervised approaches such as kmeans clustering [48], [66]- [70] and deep learning methods have also been adopted [45], [51], [52], [63], [71]- [82].…”
Section: B Machine Learning Techniquesmentioning
confidence: 99%
“…They are attained through consideration of the voted classes for each specific individual tree, and the class which attains the highest number of vote is considered the output. Similar issues within literature are resolved using the RF method [44], [46], [49], [54], [56]- [58], [61], [71], [73], [84]- [102]. RF details can further be attained using [103], [104].…”
Section: ) Random Forest (Rf)mentioning
confidence: 99%
See 2 more Smart Citations