2022
DOI: 10.1049/ntw2.12063
|View full text |Cite
|
Sign up to set email alerts
|

Trigonometric words ranking model for spam message classification

Abstract: The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when the word order changes. In this paper, a new framework is proposed for anti‐spam filtering that does not depend on the word's position in the message, called the Trigono… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…Artificial intelligence is a modern technology that simulates human mind functions and is used for complex tasks [19]. It encompasses machine learning and deep learning, utilizing digital systems and advanced technologies [20].…”
Section: Artificial Intelligencementioning
confidence: 99%
“…Artificial intelligence is a modern technology that simulates human mind functions and is used for complex tasks [19]. It encompasses machine learning and deep learning, utilizing digital systems and advanced technologies [20].…”
Section: Artificial Intelligencementioning
confidence: 99%
“…Before it, business applications started to appear, relying on continually developing standards like IEEE 802.11. This kind of network, which may function alone or with one or more points of attachment to cellular networks or the Internet [18], opens the door for a wide range of innovative and intriguing applications. Only a few examples of application scenarios include emergency and rescue operations, conference or university settings, vehicle networks, personal networking, etc.…”
Section: Mobile Ad-hoc Networkmentioning
confidence: 99%
“…One way to classify apps is based on the type of data that has to be collected on the network. Event detection (ED) and spatial process estimation(SPE) can be used to categorize almost every application [17][18][19]. In the first scenario, sensors detect an occurrence, such as a forest fire, earthquake, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Internet represents the dominant media of the network because it facilitates connect between two to multiple nodes worldwide [9,10], data transmitted over the Internet become prone to a different type of attack especially modification attack. As such, there is a need to prevent such attacks or at least thwart the modification attack by making the data transmitted unreadable by humans, Some practical solutions for internet threats are demonstrated in figure (2), for more information, see [11][12][13]. Therefore, lightweight encryption as a new concept of encryption is emerged to suit encrypts data produced by devices with some constraints features such as RAM, CPU and permanent storage capacity [14][15][16].…”
Section: Introductionmentioning
confidence: 99%