4.5 Article

Efficient defense strategy against spam and phishing email: An evolutionary game model

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Review Computer Science, Artificial Intelligence

Applicability of machine learning in spam and phishing email filtering: review and approaches

Tushaar Gangavarapu et al.

ARTIFICIAL INTELLIGENCE REVIEW (2020)

Article Multidisciplinary Sciences

Social efficiency deficit deciphers social dilemmas

Md Rajib Arefin et al.

SCIENTIFIC REPORTS (2020)

Article Computer Science, Theory & Methods

Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach

Lu-Xing Yang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Mathematics, Applied

OPTIMAL CONTAINMENT OF EPIDEMICS OVER TEMPORAL ACTIVITY-DRIVEN NETWORKS

Masaki Ogura et al.

SIAM JOURNAL ON APPLIED MATHEMATICS (2019)

Review Multidisciplinary Sciences

Machine learning for email spam filtering: review, approaches and open research problems

Emmanuel Gbenga Dada et al.

HELIYON (2019)

Article Computer Science, Information Systems

Data-Driven Cybersecurity Incident Prediction: A Survey

Nan Sun et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Using evolutionary computation for discovering spam patterns from e-mail samples

David Ruano-Ordas et al.

INFORMATION PROCESSING & MANAGEMENT (2018)

Article Engineering, Electrical & Electronic

Email Classification Research Trends: Review and Open Issues

Ghulam Mujtaba et al.

IEEE Access (2017)

Article Physics, Fluids & Plasmas

Optimal allocation of resources for suppressing epidemic spreading on networks

Hanshuang Chen et al.

PHYSICAL REVIEW E (2017)

Article Computer Science, Information Systems

Recent developments in social spam detection and combating techniques: A survey

Manajit Chakraborty et al.

INFORMATION PROCESSING & MANAGEMENT (2016)

Article Computer Science, Hardware & Architecture

A large-scale empirical analysis of email spam detection through network characteristics in a stand-alone enterprise

Tu Ouyang et al.

COMPUTER NETWORKS (2014)

Article Automation & Control Systems

Optimal Resource Allocation for Network Protection Against Spreading Processes

Victor M. Preciado et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2014)

Article Physics, Fluids & Plasmas

Insight into the so-called spatial reciprocity

Zhen Wang et al.

PHYSICAL REVIEW E (2013)

Article Multidisciplinary Sciences

Limits of Predictability in Human Mobility

Chaoming Song et al.

SCIENCE (2010)

Article Computer Science, Artificial Intelligence

A survey of learning-based techniques of email spam filtering

Enrico Blanzieri et al.

ARTIFICIAL INTELLIGENCE REVIEW (2009)

Review Computer Science, Artificial Intelligence

A review of machine learning approaches to Spam filtering

Thiago S. Guzella et al.

EXPERT SYSTEMS WITH APPLICATIONS (2009)

Article Computer Science, Hardware & Architecture

Modeling and simulation study of the propagation and defense of internet e-mail worms

Cliff C. Zou et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2007)

Article Computer Science, Information Systems

Understanding the network-level behavior of sparrimers

Anirudh Ramachandran et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2006)

Article Physics, Multidisciplinary

Network dynamics of ongoing social relationships

P Holme

EUROPHYSICS LETTERS (2003)