LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Publisher: GITA
Languages: English
Types: Unknown
Subjects: media_dig_tech_and_creative_econ

Classified by OpenAIRE into

ACM Ref: ComputingMethodologies_PATTERNRECOGNITION
‘Scam’ is a fraudulence message by criminal intent sent to internet user mailboxes. Many approaches have been proposed to filter out unsolicited messages known as ‘spam’ from legitimate messages known as ‘ham’. However up to this date no suitable approach has been proposed to detect Scams. Almost all spam filters which use Machine Learning approaches, classify scams as hams when scam messages are more similar to\ud the average ham than spam. But such fraudulence messages can be very harmful to users as many people in\ud the world lose their funds by relying on scam messages.\ud In this paper we use Data Mining techniques for scam detection. Bayesian Classifier, Naïve Bayes and\ud K-Nearest Neighbor which are mostly used in spam detection are experimented and the results are reported.\ud In addition, a new approach in scam detection is proposed. This approach uses K-Nearest Neighbour algorithm with modification to Document Similarity equation. Additionally, classification is not binary as ‘scam’ or ‘not scam’: a Fuzzy Decision is used instead of clear types of classes. Scam messages are successfully detected by applying this approach.

Share - Bookmark

Cite this article