Rejecting spam during SMTP sessions
This paper analyzes a spam rejection scheme at Simple Mail Transfer Protocol (SMTP) sessions. This scheme utilizes a layer-3 e-mail pre-classification technique to estimate e-mail classes before an SMTP session ends. We study the spam rejection scheme using discrete-time Markov chain analysis and an...
| Main Authors: | Marsono, Muhammad N., El-Kharashi, M. Watheq, Gebali, Fayez |
|---|---|
| Format: | Book Section |
| Language: | English |
| Published: |
Institute of Electrical and Electronics Engineering (IEEE)
2007
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/9602/ http://eprints.utm.my/9602/1/MuhammadNMarsono2007RejectingSpamDuringSMTPSessions.pdf |
Similar Items
Prioritized e-mail servicing to reduce non-spam delay and loss: a performance-cost analysis
by: Marsono, Muhammad Nadzir, et al.
Published: (2007)
by: Marsono, Muhammad Nadzir, et al.
Published: (2007)
Performance analysis of server-side spam control strategies based on layer-3 classification
by: Marsono, M. N., et al.
Published: (2007)
by: Marsono, M. N., et al.
Published: (2007)
A new efficient text detection method for image spam filtering
by: Al Muataz, Zubaidah, et al.
Published: (2015)
by: Al Muataz, Zubaidah, et al.
Published: (2015)
Spam e-mail: how Malaysian e-mail users deal with it?
by: Bujang, Yanti Rosmunie, et al.
Published: (2010)
by: Bujang, Yanti Rosmunie, et al.
Published: (2010)
Email spam classification based on deep learning methods: A review
by: Tusher, Ekramul Haque, et al.
Published: (2025)
by: Tusher, Ekramul Haque, et al.
Published: (2025)
Spam filtering using bayesian technique based on independent feature selection
by: Mohamad, Masurah
Published: (2006)
by: Mohamad, Masurah
Published: (2006)
Email spam: A comprehensive review of optimize detection methods, challenges, and open research problems
by: Tusher, Ekramul Haque, et al.
Published: (2024)
by: Tusher, Ekramul Haque, et al.
Published: (2024)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
Detecting opinion spams through supervised boosting approach
by: Mohamad, Hazim, et al.
Published: (2018)
by: Mohamad, Hazim, et al.
Published: (2018)
First Semester Examination
2020/2021 Academic Session
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
An improved framework for content and link-based web spam detection: a combined approach
by: Shahzad, Asim
Published: (2021)
by: Shahzad, Asim
Published: (2021)
A Comparison Between Inter-Asterisk eXchange
Protocol and Jingle Protocol: Session Time
by: Haj Aliwi, H. S., et al.
Published: (2016)
by: Haj Aliwi, H. S., et al.
Published: (2016)
The effect of ECN on short TCP sessions
by: M. Kadhum, Mohammed, et al.
Published: (2007)
by: M. Kadhum, Mohammed, et al.
Published: (2007)
Critical analysis of the usage of patient demographic
and clinical records during doctor-patient
consultations: a Malaysian perspective
by: Abd Ghani, Mohd Khanapi, et al.
Published: (2010)
by: Abd Ghani, Mohd Khanapi, et al.
Published: (2010)
The performance of soft computing techniques on content-based SMS spam filtering
by: Hassan Saeed, Waddah Waheeb
Published: (2015)
by: Hassan Saeed, Waddah Waheeb
Published: (2015)
A Review on mobile SMS Spam filtering techniques
by: Abdulhamid, Shafi'i Muhammad, et al.
Published: (2017)
by: Abdulhamid, Shafi'i Muhammad, et al.
Published: (2017)
A deep autoencoder-based representation for Arabic text categorization
by: El-Alami, Fatima-Zahra, et al.
Published: (2020)
by: El-Alami, Fatima-Zahra, et al.
Published: (2020)
A systematic reading in statistical translation: From the statistical machine translation to the neural translation models
by: El Maazouzi, Zakaria, et al.
Published: (2017)
by: El Maazouzi, Zakaria, et al.
Published: (2017)
Factors influencing cloud computing adoption in small medium enterprises
by: El Maazouzi, Zakaria, et al.
Published: (2017)
by: El Maazouzi, Zakaria, et al.
Published: (2017)
Educational Multiplayer Game For Encourage Communication During Covid-19
by: Lee, Zi Xuan
Published: (2023)
by: Lee, Zi Xuan
Published: (2023)
Developing an algorithm for triad design
by: Abu Saa, Tareq M., et al.
Published: (2012)
by: Abu Saa, Tareq M., et al.
Published: (2012)
Dual solutions and stability analysis of a hybrid nanofluid over a stretching/shrinking sheet executing MHD flow
by: Lund, Liaquat Ali, et al.
Published: (2020)
by: Lund, Liaquat Ali, et al.
Published: (2020)
Investigating the effect of data representation on neural network and regression
by: Siraj, Fadzilah, et al.
Published: (2009)
by: Siraj, Fadzilah, et al.
Published: (2009)
Requirements analysis for SBS system and study review process iteration during requirements phase
by: Alghamdi, Hanan Musafer H.
Published: (2009)
by: Alghamdi, Hanan Musafer H.
Published: (2009)
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
by: Adewole Kayode, Sakariyah
Published: (2018)
by: Adewole Kayode, Sakariyah
Published: (2018)
Stability analysis of the magnetized casson nanofluid propagating through an exponentially shrinking/stretching plate: Dual solutions
by: Lund, Liaquat Ali, et al.
Published: (2020)
by: Lund, Liaquat Ali, et al.
Published: (2020)
Effects of stefan blowing and slip conditions on unsteady MHD casson nanofluid flow over an unsteady shrinking sheet: Dual solutions
by: Lund, Liaquat Ali, et al.
Published: (2020)
by: Lund, Liaquat Ali, et al.
Published: (2020)
Camera Sensor Network Localization Using FPGA
by: El-khatib, Lina Noaman, et al.
Published: (2010)
by: El-khatib, Lina Noaman, et al.
Published: (2010)
Sentiment analysis for airline services on Twitter using deep learning with word embedding / Mawada Mohamed Nour El Daim El Khalifa
by: Mawada Mohamed , Nour El Daim El Khalifa
Published: (2020)
by: Mawada Mohamed , Nour El Daim El Khalifa
Published: (2020)
Compact structure representation in discovering frequent patterns for association rules
by: Mustapha, N., et al.
Published: (2002)
by: Mustapha, N., et al.
Published: (2002)
Process Sequencing Modeled as TSP with Precedence Constraints - A Genetic Algorithm Approach
by: N. M., Razali
Published: (2014)
by: N. M., Razali
Published: (2014)
Stability analysis and multiple solution of Cu–Al2O3/H2O nanofluid contains hybrid nanomaterials over a shrinking surface in the presence of viscous dissipation
by: Lund, Liaquat Ali, et al.
Published: (2020)
by: Lund, Liaquat Ali, et al.
Published: (2020)
Magnetohydrodynamic (MHD) flow of micropolar fluid with effects of viscous dissipation and joule heating over an exponential shrinking sheet: Triple solutions and stability analysis
by: Lund, Liaquat Ali, et al.
Published: (2020)
by: Lund, Liaquat Ali, et al.
Published: (2020)
NSGA-II Algorithm for Assembly Line Balancing with Multi-Resource Constraints
by: M. F. F., Ab Rashid, et al.
Published: (2016)
by: M. F. F., Ab Rashid, et al.
Published: (2016)
Enhancement the video quality forwarding Using Receiver-Based Approach (URBA) in Vehicular Ad-Hoc Network
by: Hammood, Omar A., et al.
Published: (2017)
by: Hammood, Omar A., et al.
Published: (2017)
E-Appointment Scheduling Using Constraints Logic Programming
by: N., Ahmad, et al.
Published: (2007)
by: N., Ahmad, et al.
Published: (2007)
Parametric modelling of Malaysian teeth template using computer aided design
by: Ahmat, M. M., et al.
Published: (2016)
by: Ahmat, M. M., et al.
Published: (2016)
Building a truster environment for e-business : a Malaysian perspective
by: Din, M.N., et al.
Published: (2002)
by: Din, M.N., et al.
Published: (2002)
Performance evaluation of secured versus non-secured EIGRP routing protocol
by: Al-Saud, Khalid Abu, et al.
Published: (2008)
by: Al-Saud, Khalid Abu, et al.
Published: (2008)
Spatial layout design factors during panic situations
by: Ibrahim, Najihah, et al.
Published: (2017)
by: Ibrahim, Najihah, et al.
Published: (2017)
Similar Items
-
Prioritized e-mail servicing to reduce non-spam delay and loss: a performance-cost analysis
by: Marsono, Muhammad Nadzir, et al.
Published: (2007) -
Performance analysis of server-side spam control strategies based on layer-3 classification
by: Marsono, M. N., et al.
Published: (2007) -
A new efficient text detection method for image spam filtering
by: Al Muataz, Zubaidah, et al.
Published: (2015) -
Spam e-mail: how Malaysian e-mail users deal with it?
by: Bujang, Yanti Rosmunie, et al.
Published: (2010) -
Email spam classification based on deep learning methods: A review
by: Tusher, Ekramul Haque, et al.
Published: (2025)