31
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Machine Learning-Based Detection of Spam Emails

      1 , 1 , 1 ,   2 , 2 , 3
      Scientific Programming
      Hindawi Limited

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Social communication has evolved, with e-mail still being one of the most common communication means, used for both formal and informal ways. With many languages being digitized for the electronic world, the use of English is still abundant. However, various native languages of different regions are emerging gradually. The Urdu language, coming from South Asia, mostly Pakistan, is also getting its pace as a medium for communications used in social media platforms, websites, and emails. With the increased usage of emails, Urdu’s number and variety of spam content also increase. Spam emails are inappropriate and unwanted messages usually sent to breach security. These spam emails include phishing URLs, advertisements, commercial segments, and a large number of indiscriminate recipients. Thus, such content is always a hazard for the user, and many studies have taken place to detect such spam content. However, there is a dire need to detect spam emails, which have content written in Urdu language. The proposed study utilizes the existing machine learning algorithms including Naive Bayes, CNN, SVM, and LSTM to detect and categorize e-mail content. According to our findings, the LSTM model outperforms other models with a highest score of 98.4% accuracy.

          Related collections

          Most cited references15

          • Record: found
          • Abstract: found
          • Article: not found

          Support vector machines for spam categorization.

          We study the use of support vector machines (SVM's) in classifying e-mail as spam or nonspam by comparing it to three other classification algorithms: Ripper, Rocchio, and boosting decision trees. These four algorithms were tested on two different data sets: one data set where the number of features were constrained to the 1000 best features and another data set where the dimensionality was over 7000. SVM's performed best when using binary features. For both data sets, boosting trees and SVM's had acceptable test performance in terms of accuracy and speed. However, SVM's had significantly less training time.
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            A review on particle swarm optimization algorithms and their applications to data clustering

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A Comprehensive Survey for Intelligent Spam Email Detection

                Bookmark

                Author and article information

                Contributors
                Journal
                Scientific Programming
                Scientific Programming
                Hindawi Limited
                1875-919X
                1058-9244
                December 17 2021
                December 17 2021
                : 2021
                : 1-11
                Affiliations
                [1 ]Department of Information Technology, The University of Haripur, Haripur, Pakistan
                [2 ]Chair of Cyber Security, Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia
                [3 ]Department of Computer Science, University of Swabi, Swabi, Pakistan
                Article
                10.1155/2021/6508784
                37b5780e-7b45-4512-945d-cd3ac39bddf5
                © 2021

                https://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article