English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 111314/142224 (78%)
Visitors : 48361428      Online Users : 1013
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/112126


    Title: An intelligent three-phase spam filtering method based on decision tree data mining
    Authors: 許志堅
    Sheu, Jyh-Jian
    Chen, Yin-Kai
    Chu, Ko-Tsung
    Tang, Jih-Hsin
    Yang, Wei-Pang
    Contributors: 廣播電視學系
    Keywords: Artificial intelligence;Decision trees;Electronic mail;Internet;Learning systems;Supervised learning;Trees (mathematics);Filtering method;Learning mechanism;Operating efficiency;Overall accuracies;Spam;Spam filtering;Supervised machine learning;Three phase;Data mining
    Date: 2016-11
    Issue Date: 2017-08-23 11:36:00 (UTC+8)
    Abstract: In this paper, we proposed an efficient spam filtering method based on decision tree data mining technique, analyzed the association rules about spams, and applied these rules to develop a systematized spam filtering method. Our method possessed the following three major superiorities: (i) checking only an e-mail`s header section to avoid the low-operating efficiency in scanning an e-mail`s content. Moreover, the accuracy of filtering was enhanced simultaneously. (ii) In order that the probable misjudgment in identifying an unknown e-mail could be “reversed”, we had constructed a reversing mechanism to help the classification of unknown e-mails. Thus, the overall accuracy of our filtering method will be increased. (iii) Our method was equipped with a re-learning mechanism, which utilized the supervised machine learning method to collect and analyze each misjudged e-mail. Therefore, the revision information learned from the analysis of misjudged e-mails incrementally gave feedback to our method, and its ability of identifying spams would be improved.
    Relation: Security and Communication Networks, 9(17), 4013-4026
    Data Type: article
    DOI link: http://dx.doi.org/10.1002/sec.1584
    DOI: 10.1002/sec.1584
    Appears in Collections:[Department of Radio & Television & Graduate Program] Periodical Articles

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML2750View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback