A methodology for sender-oriented anti-spamming

@article{Ahmad2020AMF,
  title={A methodology for sender-oriented anti-spamming},
  author={Adnan Ahmad and Anique Azhar and Sajid Naqvi and Asif Nawaz and Samia Arshad and Furkh Zeshan and Mohammed Yousif and Ali O. M. Salih},
  journal={J. Intell. Fuzzy Syst.},
  year={2020},
  volume={38},
  pages={2765-2776}
}

References

SHOWING 1-10 OF 16 REFERENCES
Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states
TLDR
A new robust General N user authentication protocol based on N-particle Greenberger–Horne–Zeilinger (GHZ) states is presented, which makes eavesdropping detection more effective and secure, as compared to some current authentication protocols.
A Survey on Extraction Approach for Spam Filtering
TLDR
Various techniques that are used spam filtering are presented, which are mostly based on electronics mails for both commercial and business purposes.
A scheme for secure quantum communication network with authentication using GHZ-like states and cluster states controlled teleportation
We propose a scheme for a secure message communication network with authentication following the idea in controlled teleportation. In this scheme, the servers of the network provide the service to
Spamalytics: an empirical analysis of spam marketing conversion
TLDR
Using a parasitic infiltration of an existing botnet's infrastructure, a methodology for measuring the conversion rate of spam is presented and two spam campaigns are analyzed: one designed to propagate a malware Trojan, the other marketing on-line pharmaceuticals.
An Approach to Spam Detection by Naive Bayes Ensemble Based on Decision Induction
TLDR
A two-layered spam detection flow was used, which showed the trade-off between accuracy and efficiency and a naive Bayes classifiers ensemble based on bagging model based on embedded decision tree was proposed.
Current and New Developments in Spam Filtering
TLDR
An overview of current and potential future spam filtering techniques, with a broad review of automated, non-interactive filters, ranging from commercial implementations to ideas confined to current research papers.
A generalized architecture of quantum secure direct communication for N disjointed users with authentication
TLDR
A secured direct communication process between N users with partial and full cooperation of quantum server is generalized to ensure the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.
...
...