Cloud e-mail security: An accurate e-mail spam classification based on enhanced binary differential evolution (BDE) algorithm

被引:0
|
作者
Hamed, Nadir O. [1 ]
Samak, Ahmed H. [1 ,2 ]
Ahmad, Mostafa A. [1 ,3 ]
机构
[1] Faculty of Computing and Information Technology, University of Bisha, Bisha, Saudi Arabia
[2] Faculty of Science, Menofia University, Shibeen El-Kom, Egypt
[3] Faculty of Computers Information, Menofia University, Shibeen El-Kom, Egypt
来源
关键词
Support vector machines;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:5943 / 5955
相关论文
共 50 条
  • [31] Security measures and implement of E-mail
    Jisuanji Gongcheng, 10 (38-39, 74):
  • [32] Double trouble for e-mail security
    Hoffman, P
    BYTE, 1998, 23 (05): : 40 - 40
  • [33] Computer security bulletins by e-mail
    不详
    JOURNAL OF THE AMERICAN DENTAL ASSOCIATION, 2004, 135 (04): : 426 - 426
  • [34] An improved e-mail security protocol
    Schneier, B
    Hall, C
    13TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1997, : 227 - 230
  • [35] The Research and Implementation of Spam E-mail Filtering Based on Improved Bayesian Algorithm
    Zhang, Sifa
    Zuo, Fengmei
    PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, 2008, : 132 - 135
  • [36] E-mail security gets personal
    Paulson, LD
    COMPUTER, 2004, 37 (01) : 26 - 26
  • [37] On the security of a certified E-mail scheme
    Wang, GL
    Bao, F
    Zhou, JY
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 48 - 60
  • [38] E-Mail Spam Detection Based on Part of Speech Tagging
    Parsaei, Mohammad Reza
    Salehi, Mohammad
    2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 1010 - 1013
  • [40] Proxy approach to e-mail security
    Brown, Ian
    Snow, C.R.
    Software - Practice and Experience, 1999, 29 (12) : 1049 - 1060