Semantic analysis for spam filtering

Many different techniques have been employed to analyze spam emails. The paper explores two main semantic methods: Bayesian algorithms and Support Vector Machine (SVM). More recent spam filters are introduced in the paper. They all utilize semantic analysis information to determine whether a message...

Full description

Saved in:
Bibliographic Details
Published in2010 Seventh International Conference on Fuzzy Systems and Knowledge Discovery Vol. 6; pp. 2914 - 2917
Main Authors Man Qi, Mousoli, Reza
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.08.2010
Subjects
Online AccessGet full text
ISBN1424459311
9781424459315
DOI10.1109/FSKD.2010.5569277

Cover

Abstract Many different techniques have been employed to analyze spam emails. The paper explores two main semantic methods: Bayesian algorithms and Support Vector Machine (SVM). More recent spam filters are introduced in the paper. They all utilize semantic analysis information to determine whether a message is spam.
AbstractList Many different techniques have been employed to analyze spam emails. The paper explores two main semantic methods: Bayesian algorithms and Support Vector Machine (SVM). More recent spam filters are introduced in the paper. They all utilize semantic analysis information to determine whether a message is spam.
Author Man Qi
Mousoli, Reza
Author_xml – sequence: 1
  surname: Man Qi
  fullname: Man Qi
  organization: Dept. of Comput., Canterbury Christ Church Univ., Canterbury, UK
– sequence: 2
  givenname: Reza
  surname: Mousoli
  fullname: Mousoli, Reza
  organization: Dept. of Comput., Canterbury Christ Church Univ., Canterbury, UK
BookMark eNpFj09Lw0AUxLdoQVv7AcRLDl5T39s_2exRqm3Fgod4L8_mrawk25LNpd_eBQvOZZjfwMDMxHU8RhbiHmGJCO5p3by_LCXkaEzlpLUTMUMttTZOqfrqPyDeiEVKP5CljQRlbsVjwz3FMRwKitSdU0iFPw5FOlFf-NCNPIT4fSemnrrEi4vPRbN-_Vxty93H5m31vCuDg7GUbKjW7NpKWf2larKtcwfMCCEDZGxdCx4l-1wqtgaVrrAGIKoymIuHv9XAzPvTEHoazvvLJ_ULNlpAHw
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/FSKD.2010.5569277
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL) (F)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1424459338
9781424459339
1424459346
9781424459346
EndPage 2917
ExternalDocumentID 5569277
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-2e5a84e9d6374b38a7d99c184e1074b1e1d9d0f12ef38a3e7513461800aa68a3
IEDL.DBID RIE
ISBN 1424459311
9781424459315
IngestDate Wed Aug 27 02:57:47 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-2e5a84e9d6374b38a7d99c184e1074b1e1d9d0f12ef38a3e7513461800aa68a3
PageCount 4
ParticipantIDs ieee_primary_5569277
PublicationCentury 2000
PublicationDate 2010-Aug.
PublicationDateYYYYMMDD 2010-08-01
PublicationDate_xml – month: 08
  year: 2010
  text: 2010-Aug.
PublicationDecade 2010
PublicationTitle 2010 Seventh International Conference on Fuzzy Systems and Knowledge Discovery
PublicationTitleAbbrev FSKD
PublicationYear 2010
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000452035
Score 1.4618393
Snippet Many different techniques have been employed to analyze spam emails. The paper explores two main semantic methods: Bayesian algorithms and Support Vector...
SourceID ieee
SourceType Publisher
StartPage 2914
SubjectTerms Bayesian Algorithms
Classification algorithms
Filtering
Postal services
semantic methods
Semantics
spam filtering
Support Vector Machine (SVM)
Support vector machines
Unsolicited electronic mail
Title Semantic analysis for spam filtering
URI https://ieeexplore.ieee.org/document/5569277
Volume 6
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH9sO3lS2cRvetjRbs13c1bHUCZCFXYbafMCQ9aJtBf_epO2mygevDUfhCQtfXl5v9_vAYwTitY57-RIxnnMpUljIy3G_tshxAXNOBHYyIsnOX_lD0ux7MHNnguDiA34DCfhsYnl221Rh6uyqRBSU6X60FepbLla-_uUIA3uh95xt4RmhOwknbqy6KKaJNHTWfZ41wK7ukF_ZFdpjMvsEBa7abWYkrdJXeWT4vOXYuN_530Eo28aX_S8N1DH0MNyCOMMN34310VkOj2SyJ9bI_9j2URuHWLnvu8Istn9y-087lIlxGudVDFFYVKO2kqmeM5So6zWhXfeMOAtc4LEaps4QtH5RoZKEMYl8YdFY6SvOIFBuS3xFCJNnJJ57kyhgmdCjJMhPQ8lrKBUc34Gw7C-1XurhbHqlnb-d_UFHLTR9gCYu4RB9VHjlTfiVX7dvL0vSMWVqA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED6VMsAEqEW8ydCRtPG7noGq0IeQWqRulROfpQq1RShd-PXYSVoEYmCLH7JsJ8r5fN_3HUAroWid806OZJzHXJpubKTF2H87hLigGScCG3k0lv1X_jwTsxrc7bgwiFiAz7AdHotYvl1nm3BV1hFCaqrUHuwLzrko2Vq7G5UgDu4H37K3hGaEbEWdqrKo4pok0Z3eZPBQQruqYX_kVynMS-8IRtuJlaiSt_YmT9vZ5y_Nxv_O_Bia30S-6GVnok6ghqsGtCa49Pu5yCJTKZJE_uQa-V_LMnKLED33fZsw6T1O7_txlSwhXugkjykK0-WorWSKp6xrlNU68-4bBsRlSpBYbRNHKDrfyFAJwrgk_rhojPQVp1BfrVd4BpEmTsk0dSZTwTchxsmQoIcSllGqOT-HRljf_L1Uw5hXS7v4u_oWDvrT0XA-fBoPLuGwjL0H-NwV1POPDV57k56nN8Wb_AJajpj1
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+Seventh+International+Conference+on+Fuzzy+Systems+and+Knowledge+Discovery&rft.atitle=Semantic+analysis+for+spam+filtering&rft.au=Man+Qi&rft.au=Mousoli%2C+Reza&rft.date=2010-08-01&rft.pub=IEEE&rft.isbn=9781424459315&rft.volume=6&rft.spage=2914&rft.epage=2917&rft_id=info:doi/10.1109%2FFSKD.2010.5569277&rft.externalDocID=5569277
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424459315/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424459315/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424459315/sc.gif&client=summon&freeimage=true