Bio inspired email spam detection: A quantitative investigation

Spam has long been used by criminals to conduct illegal online operations including stealing personal information, selling counterfeit goods, and spreading malware. Spammer is a term used to describe someone who creates spam. Spamming is carried out in the following ways: Advertising, sending messag...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Vinoth, N. A. S., Rajesh, A.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 1
container_start_page
container_title
container_volume 3075
creator Vinoth, N. A. S.
Rajesh, A.
description Spam has long been used by criminals to conduct illegal online operations including stealing personal information, selling counterfeit goods, and spreading malware. Spammer is a term used to describe someone who creates spam. Spamming is carried out in the following ways: Advertising, sending messages to the same website multiple times, are all examples of spam. Spam has become the preferred method for cyber criminals to propagate harmful software. Due to the disclosure of information to unauthorized parties, collaborative detection has implications for email privacy. Due to the large number of emails exchanged between users, spam identification is challenging. Pop-ups that appear in the form of internet advertising are also difficult to ignore. It is often a tiny window, which emerges abruptly in front of a display area. This study presents a comparison of several Bio Inspired spam detection algorithms.
doi_str_mv 10.1063/5.0217037
format Conference Proceeding
fullrecord <record><control><sourceid>proquest_scita</sourceid><recordid>TN_cdi_scitation_primary_10_1063_5_0217037</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3085724280</sourcerecordid><originalsourceid>FETCH-LOGICAL-p637-d006c80dd37eab053a9d4b24a3038cc15150274318a6fcc01766c14b853187193</originalsourceid><addsrcrecordid>eNotkEtLA0EQhAdRMEYP_oMFb8LG7nmvF4nBFwS85OBtmJ2dyITsIzuzAf99NianhuqPqqIIuUeYIUj2JGZAUQFTF2SCQmCuJMpLMgEoeE45-7kmNzFuAGihlJ6Ql9fQZqGJXeh9lfnahm0WO1tnlU_epdA2z9k82w22SSHZFPZ-pPc-pvBrj99bcrW22-jvzndKVu9vq8Vnvvz--FrMl3knmcorAOk0VBVT3pYgmC0qXlJuGTDtHAoUQBVnqK1cOweopHTISy1GSWHBpuThZNv17W4Y482mHfpmTDQMtFCUUw0j9Xiiovsv2zam60Nt-z-DYI77GGHO-7ADkVVVlQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>3085724280</pqid></control><display><type>conference_proceeding</type><title>Bio inspired email spam detection: A quantitative investigation</title><source>AIP Journals Complete</source><creator>Vinoth, N. A. S. ; Rajesh, A.</creator><contributor>Godfrey Winster, S ; Pushpalatha, M ; Baskar, M ; Kishore Anthuvan Sahayaraj, K</contributor><creatorcontrib>Vinoth, N. A. S. ; Rajesh, A. ; Godfrey Winster, S ; Pushpalatha, M ; Baskar, M ; Kishore Anthuvan Sahayaraj, K</creatorcontrib><description>Spam has long been used by criminals to conduct illegal online operations including stealing personal information, selling counterfeit goods, and spreading malware. Spammer is a term used to describe someone who creates spam. Spamming is carried out in the following ways: Advertising, sending messages to the same website multiple times, are all examples of spam. Spam has become the preferred method for cyber criminals to propagate harmful software. Due to the disclosure of information to unauthorized parties, collaborative detection has implications for email privacy. Due to the large number of emails exchanged between users, spam identification is challenging. Pop-ups that appear in the form of internet advertising are also difficult to ignore. It is often a tiny window, which emerges abruptly in front of a display area. This study presents a comparison of several Bio Inspired spam detection algorithms.</description><identifier>ISSN: 0094-243X</identifier><identifier>EISSN: 1551-7616</identifier><identifier>DOI: 10.1063/5.0217037</identifier><identifier>CODEN: APCPCS</identifier><language>eng</language><publisher>Melville: American Institute of Physics</publisher><subject>Advertising ; Algorithms ; Counterfeit ; Electronic mail ; Spamming</subject><ispartof>AIP conference proceedings, 2024, Vol.3075 (1)</ispartof><rights>Author(s)</rights><rights>2024 Author(s). Published under an exclusive license by AIP Publishing.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://pubs.aip.org/acp/article-lookup/doi/10.1063/5.0217037$$EHTML$$P50$$Gscitation$$H</linktohtml><link.rule.ids>309,310,314,780,784,789,790,794,4502,23921,23922,25131,27915,27916,76145</link.rule.ids></links><search><contributor>Godfrey Winster, S</contributor><contributor>Pushpalatha, M</contributor><contributor>Baskar, M</contributor><contributor>Kishore Anthuvan Sahayaraj, K</contributor><creatorcontrib>Vinoth, N. A. S.</creatorcontrib><creatorcontrib>Rajesh, A.</creatorcontrib><title>Bio inspired email spam detection: A quantitative investigation</title><title>AIP conference proceedings</title><description>Spam has long been used by criminals to conduct illegal online operations including stealing personal information, selling counterfeit goods, and spreading malware. Spammer is a term used to describe someone who creates spam. Spamming is carried out in the following ways: Advertising, sending messages to the same website multiple times, are all examples of spam. Spam has become the preferred method for cyber criminals to propagate harmful software. Due to the disclosure of information to unauthorized parties, collaborative detection has implications for email privacy. Due to the large number of emails exchanged between users, spam identification is challenging. Pop-ups that appear in the form of internet advertising are also difficult to ignore. It is often a tiny window, which emerges abruptly in front of a display area. This study presents a comparison of several Bio Inspired spam detection algorithms.</description><subject>Advertising</subject><subject>Algorithms</subject><subject>Counterfeit</subject><subject>Electronic mail</subject><subject>Spamming</subject><issn>0094-243X</issn><issn>1551-7616</issn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2024</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNotkEtLA0EQhAdRMEYP_oMFb8LG7nmvF4nBFwS85OBtmJ2dyITsIzuzAf99NianhuqPqqIIuUeYIUj2JGZAUQFTF2SCQmCuJMpLMgEoeE45-7kmNzFuAGihlJ6Ql9fQZqGJXeh9lfnahm0WO1tnlU_epdA2z9k82w22SSHZFPZ-pPc-pvBrj99bcrW22-jvzndKVu9vq8Vnvvz--FrMl3knmcorAOk0VBVT3pYgmC0qXlJuGTDtHAoUQBVnqK1cOweopHTISy1GSWHBpuThZNv17W4Y482mHfpmTDQMtFCUUw0j9Xiiovsv2zam60Nt-z-DYI77GGHO-7ADkVVVlQ</recordid><startdate>20240729</startdate><enddate>20240729</enddate><creator>Vinoth, N. A. S.</creator><creator>Rajesh, A.</creator><general>American Institute of Physics</general><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20240729</creationdate><title>Bio inspired email spam detection: A quantitative investigation</title><author>Vinoth, N. A. S. ; Rajesh, A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p637-d006c80dd37eab053a9d4b24a3038cc15150274318a6fcc01766c14b853187193</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Advertising</topic><topic>Algorithms</topic><topic>Counterfeit</topic><topic>Electronic mail</topic><topic>Spamming</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Vinoth, N. A. S.</creatorcontrib><creatorcontrib>Rajesh, A.</creatorcontrib><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Vinoth, N. A. S.</au><au>Rajesh, A.</au><au>Godfrey Winster, S</au><au>Pushpalatha, M</au><au>Baskar, M</au><au>Kishore Anthuvan Sahayaraj, K</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Bio inspired email spam detection: A quantitative investigation</atitle><btitle>AIP conference proceedings</btitle><date>2024-07-29</date><risdate>2024</risdate><volume>3075</volume><issue>1</issue><issn>0094-243X</issn><eissn>1551-7616</eissn><coden>APCPCS</coden><abstract>Spam has long been used by criminals to conduct illegal online operations including stealing personal information, selling counterfeit goods, and spreading malware. Spammer is a term used to describe someone who creates spam. Spamming is carried out in the following ways: Advertising, sending messages to the same website multiple times, are all examples of spam. Spam has become the preferred method for cyber criminals to propagate harmful software. Due to the disclosure of information to unauthorized parties, collaborative detection has implications for email privacy. Due to the large number of emails exchanged between users, spam identification is challenging. Pop-ups that appear in the form of internet advertising are also difficult to ignore. It is often a tiny window, which emerges abruptly in front of a display area. This study presents a comparison of several Bio Inspired spam detection algorithms.</abstract><cop>Melville</cop><pub>American Institute of Physics</pub><doi>10.1063/5.0217037</doi><tpages>6</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0094-243X
ispartof AIP conference proceedings, 2024, Vol.3075 (1)
issn 0094-243X
1551-7616
language eng
recordid cdi_scitation_primary_10_1063_5_0217037
source AIP Journals Complete
subjects Advertising
Algorithms
Counterfeit
Electronic mail
Spamming
title Bio inspired email spam detection: A quantitative investigation
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T03%3A55%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_scita&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Bio%20inspired%20email%20spam%20detection:%20A%20quantitative%20investigation&rft.btitle=AIP%20conference%20proceedings&rft.au=Vinoth,%20N.%20A.%20S.&rft.date=2024-07-29&rft.volume=3075&rft.issue=1&rft.issn=0094-243X&rft.eissn=1551-7616&rft.coden=APCPCS&rft_id=info:doi/10.1063/5.0217037&rft_dat=%3Cproquest_scita%3E3085724280%3C/proquest_scita%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3085724280&rft_id=info:pmid/&rfr_iscdi=true