Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

July Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the July 2023 Edition of the journal. The last date of research paper submission is June 15, 2023.

Spam Detection Approaches and Strategies: A Phenomenon

Balogun Abiodun Kamoru, Azmi Bin Jaafar, Masrah Azrifah Azmi Murad, Ezema Onyeka Ernest, Marzanah Binti A. Jabar Published in Security

International Journal of Applied Information Systems
Year of Publication: 2017
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors:Balogun Abiodun Kamoru, Azmi Bin Jaafar, Masrah Azrifah Azmi Murad, Ezema Onyeka Ernest, Marzanah Binti A. Jabar
10.5120/ijais2017451728
Download full text
  1. Balogun Abiodun Kamoru, Azmi Bin Jaafar, Masrah Azrifah Azmi Murad, Ezema Onyeka Ernest and Marzanah Binti A Jabar. Spam Detection Approaches and Strategies: A Phenomenon. International Journal of Applied Information Systems 12(9):13-18, December 2017. URL, DOI BibTeX

    @article{10.5120/ijais2017451728,
    	author = "Balogun Abiodun Kamoru and Azmi Bin Jaafar and Masrah Azrifah Azmi Murad and Ezema Onyeka Ernest and Marzanah Binti A. Jabar",
    	title = "Spam Detection Approaches and Strategies: A Phenomenon",
    	journal = "International Journal of Applied Information Systems",
    	issue_date = "December 2017",
    	volume = 12,
    	number = 9,
    	month = "Dec",
    	year = 2017,
    	issn = "2249-0868",
    	pages = "13-18",
    	url = "http://www.ijais.org/archives/volume12/number9/1014-2017451728",
    	doi = "10.5120/ijais2017451728",
    	publisher = "Foundation of Computer Science (FCS), NY, USA",
    	address = "New York, USA"
    }
    

Abstract

The massive increase of spam is posing a very dangerous and serious threat to our email and social networks. It is pertinent and imperative to step up the spam detection approach and strategies in email and social networks. In recent years online spam has become a major problem for the sustainability of the internet globally, Excessive amounts of spam are not only reducing the quality of information available on the email and social networks but also creating concern among the users of email and various social networks.

This paper aims to analyze existing research works in spam detection strategies and approaches, state of art, the phenomenon of spam detection, to explore the rudiment of spam detection, to proposed detection scheme and potential online mitigation schemes. The paper will surveys various anti spam strategies for email and social networking. In the literature we have studied that many anti spam strategies have been discovered and work on but they are still open challenges to these different approaches and techniques, while some of them are highlighted in this articles. It is very important to work on spam detection and reposition it for the better of the world.

Reference

  1. Bowman, M., Debray, S. K., and Peterson, L. L. 1993. Reasoning about naming systems. .
  2. Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  3. Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  4. Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  5. Sannella, M. J. 1994 Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398., University of Washington.
  6. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  7. Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  8. Y.T. Yu, M.F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
  9. Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender.

Keywords

Spam Detection, Anti-Spam Strategies, Spam Mitigation, Spam Detection Scheme