Skip to main content

The Data-Mining and the Technology of Agents to Fight the Illicit Electronic Messages

  • Conference paper
  • First Online:
Methodologies for Knowledge Discovery and Data Mining (PAKDD 1999)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 1574))

Included in the following conference series:

  • 1018 Accesses

Abstract

The SPAMS are these undesirable messages that we receive by the slant of the electronic mail and that promise us glory and fortune or stun us of political slogans or violent or pornographic contents. The following article shows how to use techniques of data mining, like methods of supervised learning based on induction graphs, to analyse these Spams in order to be able to eliminate them from our electronic mail.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Email Remover, “anti-spams” component http://home.pacific.net.sg/~thantom/eremove.htm

  2. Grammatical Trigrams description of statistic approaches for the modelization of the language. http://www.rxrc.xerox.com/publis/mltt/jadt/node2.html

  3. Hobbes Internet Timeline, http://www.isoc.org/guest/zakon/Internet/History/HIT.html

  4. Mail Jail, http://hotfiles.zdnet.com/cgi-bin/texis/swlib/hotfiles/info.html?fcode=000G3C

  5. Spam Hater, http://www.cix.co.uk/~net-services/spam/spam hater.htm

  6. Trigram Technique, http://www.rxrc.xerox.com/publis/mltt/jadt/node2.html

  7. Zighed, A., Rakotomalala, R.: Graphes d’induction et apprentissage machine. Hermès Paris. (1998) (to appear)

    Google Scholar 

  8. Zighed, A., Rabaseda, S., Rakotomalala, R., Feschet, F.: Discretization Methods in Supervised Learning. Encyclopedia Of Computer Science and Technology. Marcel Dekker. (1998) (to appear)

    Google Scholar 

  9. Rakotomalala, R.: Graphes d’induction. PhD Thesis, Université Claude Bernard Lyon I. (1997)

    Google Scholar 

  10. Quinlan, J.R.: C4.5 Program for machine learning., Morgan Kaufman, San Mateo California, (1993)

    Google Scholar 

  11. Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and regression trees, Belmont, CA, Wadsworth (1984)

    Google Scholar 

  12. Côté, M., Troudi, N.: NetSA: Une architecture multiagent pour la recherche sur Internet. L’EXPERTISE informatique, vol. 4, bfseries 1, (1999), 25–29

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zighed, A., Côté, M., Troudi, N. (1999). The Data-Mining and the Technology of Agents to Fight the Illicit Electronic Messages. In: Zhong, N., Zhou, L. (eds) Methodologies for Knowledge Discovery and Data Mining. PAKDD 1999. Lecture Notes in Computer Science(), vol 1574. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48912-6_61

Download citation

  • DOI: https://doi.org/10.1007/3-540-48912-6_61

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65866-5

  • Online ISBN: 978-3-540-48912-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics