Computer Science – Cryptography and Security
Scientific paper
2011-12-23
Banday, M.T., Qadri, J.A., Jan, T.R. and Shah, N.A. (2009). "Detecting Threat E-mails using Bayesian Approach," International
Computer Science
Cryptography and Security
10 Pages
Scientific paper
Fraud and terrorism have a close connect in terms of the processes that enables and promote them. In the era of Internet, its various services that include Web, e-mail, social networks, blogs, instant messaging, chats, etc. are used in terrorism not only for communication but also for i) creation of ideology, ii) resource gathering, iii) recruitment, indoctrination and training, iv) creation of terror network, and v) information gathering. A major challenge for law enforcement and intelligence agencies is efficient and accurate gathering of relevant and growing volume of crime data. This paper reports on use of established Na\"ive Bayesian filter for classification of threat e-mails. Efficiency in filtering threat e-mail by use of three different Na\"ive Bayesian filter approaches i.e. single keywords, weighted multiple keywords and weighted multiple keywords with keyword context matching are evaluated on a threat e-mail corpus created by extracting data from sources that are very close to terrorism.
Banday Tariq M.
Jan Tariq R.
Qadri Jameel A.
Shah Nisar. A.
No associations
LandOfFree
Detecting Threat E-mails using Bayesian Approach does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Detecting Threat E-mails using Bayesian Approach, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detecting Threat E-mails using Bayesian Approach will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-192931