Automatic mining of Threatening e-mail using Ad Infinitum algorithm

@inproceedings{Balamurugan2008AutomaticMO,
  title={Automatic mining of Threatening e-mail using Ad Infinitum algorithm},
  author={Appavu alias Balamurugan and Rajaram and Muthupandian and Athiappan},
  year={2008}
}
We have proposed a new classifier named Ad Infinitum to identify e-mails containing terrorist threats. This Ad Infinitum is an enhancement of decision tree induction algorithm which will generate reliable rules to discriminate emails from potentially dangerous to those that are safe, with the help of agent. In the preprocessing stage, we have used deception theory which states that deceptive writing is characterized by reduced frequency of first person pronouns, exclusive words, elevated… CONTINUE READING

References

Publications referenced by this paper.
SHOWING 1-10 OF 14 REFERENCES

An experimental comparison of naive Bayesian and keyword-based anti-spam filtering with personal email messages

  • I.Androutsopoulos, J. Koutsias, V.Chandrinos, C. Spyropoulos
  • in: Proc. ACM SIGIR
  • 2000
Highly Influential
6 Excerpts

In search of coherence : a review of e - mail research ”

  • H Ian
  • Witten and Eibe Frank , “ Data Mining , Practical…
  • 2003

Morgan Kaufmann . [ 27 ] F . Sebastiani , “ Machine learning in automated text categorization

  • M. Steinbach, V. Kumar
  • ACM Computing Surveys
  • 2002

, and P . Moody , “ Introduction to this special issue on revisiting and reinventing e - mail ”

  • V. Bellotti Whittaker
  • Human - Computer Interaction
  • 1998

A Bayesian approach to filtering junk e-mail

  • M. Sahami, S.Dumais, D. Heckerman, E. Horvitz
  • in: Proc. AAAI Workshop on Learning for Text…
  • 1998
1 Excerpt

Similar Papers

Loading similar papers…