scroll to top
0

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "EMAIL"

1 - 10 of 123,408 results for
 "EMAIL"
Results per page:

Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2023, Vol. 74 Issue 2, p2641-2659. 19p.

Abstract: Cloud computing is one of the most attractive and cost-saving models, which provides online services to end-users. Cloud computing allows the user to access data directly from any node. But nowadays, cloud security is one of the biggest issues that ari...

AI-Enabled Grouping Bridgehead to Secure Penetration Topics of Metaverse.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2022, Vol. 73 Issue 3, p5609-5624. 16p.

Abstract: With the advent of the big data era, security issues in the context of artificial intelligence (AI) and data analysis are attracting research attention. In the metaverse, which will become a virtual asset in the future, users' communication, movement w...

Impact Analysis of Resilience Against Malicious Code Attacks via Emails.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2022, Vol. 72 Issue 3, p4803-4816. 14p.

Abstract: The damage caused by malicious software is increasing owing to the COVID-19 pandemic, such as ransomware attacks on information technology and operational technology systems based on corporate networks and social infrastructures and spear-phishing atta...

Assessing and Enhancing Adversarial Robustness of Predictive Analytics: An Empirically Tested Design Framework.

Publication Type: Academic Journal

Source(s): Journal of Management Information Systems. 2022, Vol. 39 Issue 2, p542-572. 31p. 4 Diagrams, 8 Charts, 3 Graphs.

Abstract: As predictive analytics increasingly applies supervised machine learning (SML) models to inform mission-critical decision-making, adversaries become incentivized to exploit the vulnerabilities of these SML models and mislead predictive analytics into e...

Spam Identification in Cloud Computing Based on Text Filtering System.

Publication Type: Academic Journal

Source(s): Wireless Communications & Mobile Computing. 8/21/2022, p1-7. 7p.

Authors:

Abstract: With the rapid increase of spam on the Internet and the diversification of its forms, how to quickly and effectively identify a large number of spam on the Internet has become an urgent topic. Cloud computing has obvious advantages in storage and proce...

Analysis of e-Mail Spam Detection Using a Novel Machine Learning-Based Hybrid Bagging Technique.

Publication Type: Academic Journal

Source(s): Computational Intelligence & Neuroscience. 8/9/2022, p1-12. 12p.

Authors:

Abstract: e-mail service providers and consumers find it challenging to distinguish between spam and nonspam e-mails. The purpose of spammers is to spread false information by sending annoying messages that catch the attention of the public. Various spam identif...

An Improved Image Spam Classification Model Based on Deep Learning Techniques.

Publication Type: Academic Journal

Source(s): Security & Communication Networks. 8/2/2022, p1-11. 11p.

Abstract: Image Spam is a type of spam that has embedded text in an image. Classification of Image Spam is done using various machine learning approaches based on a broad set of features extracted from the image. For its remarkable results, the convolutional neu...

Email Filtering Using Hybrid Feature Selection Model.

Publication Type: Academic Journal

Source(s): CMES-Computer Modeling in Engineering & Sciences. 2022, Vol. 132 Issue 2, p435-450. 16p.

Abstract: Undoubtedly, spam is a serious problem, and the number of spam emails is increased rapidly. Besides, the massive number of spam emails prompts the need for spam detection techniques. Several methods and algorithms are used for spam filtering. Also, som...

E-mail Spam Classification Using Grasshopper Optimization Algorithm and Neural Networks.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2022, Vol. 71 Issue 3, p4749-4766. 18p.

Abstract: Spam has turned into a big predicament these days, due to the increase in the number of spam emails, as the recipient regularly receives piles of emails. Not only is spam wasting users’ time and bandwidth. In addition, it limits the storage space of th...

Privacy-preserving spam filtering using homomorphic and functional encryption.

Publication Type: Academic Journal

Source(s): Computer Communications. Jan2023, Vol. 197, p230-241. 12p.

Abstract: Conventional spam classification requires the end-users to reveal the content of incoming emails to a classifier so that text analysis can be performed. On the other hand, new cryptographic primitives allow this classification task to be performed on e...

sponsored