Abstract
The SPAMS are these undesirable messages that we receive by the slant of the electronic mail and that promise us glory and fortune or stun us of political slogans or violent or pornographic contents. The following article shows how to use techniques of data mining, like methods of supervised learning based on induction graphs, to analyse these Spams in order to be able to eliminate them from our electronic mail.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Email Remover, “anti-spams” component http://home.pacific.net.sg/~thantom/eremove.htm
Grammatical Trigrams description of statistic approaches for the modelization of the language. http://www.rxrc.xerox.com/publis/mltt/jadt/node2.html
Hobbes Internet Timeline, http://www.isoc.org/guest/zakon/Internet/History/HIT.html
Mail Jail, http://hotfiles.zdnet.com/cgi-bin/texis/swlib/hotfiles/info.html?fcode=000G3C
Spam Hater, http://www.cix.co.uk/~net-services/spam/spam hater.htm
Trigram Technique, http://www.rxrc.xerox.com/publis/mltt/jadt/node2.html
Zighed, A., Rakotomalala, R.: Graphes d’induction et apprentissage machine. Hermès Paris. (1998) (to appear)
Zighed, A., Rabaseda, S., Rakotomalala, R., Feschet, F.: Discretization Methods in Supervised Learning. Encyclopedia Of Computer Science and Technology. Marcel Dekker. (1998) (to appear)
Rakotomalala, R.: Graphes d’induction. PhD Thesis, Université Claude Bernard Lyon I. (1997)
Quinlan, J.R.: C4.5 Program for machine learning., Morgan Kaufman, San Mateo California, (1993)
Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and regression trees, Belmont, CA, Wadsworth (1984)
Côté, M., Troudi, N.: NetSA: Une architecture multiagent pour la recherche sur Internet. L’EXPERTISE informatique, vol. 4, bfseries 1, (1999), 25–29
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zighed, A., Côté, M., Troudi, N. (1999). The Data-Mining and the Technology of Agents to Fight the Illicit Electronic Messages. In: Zhong, N., Zhou, L. (eds) Methodologies for Knowledge Discovery and Data Mining. PAKDD 1999. Lecture Notes in Computer Science(), vol 1574. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48912-6_61
Download citation
DOI: https://doi.org/10.1007/3-540-48912-6_61
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65866-5
Online ISBN: 978-3-540-48912-2
eBook Packages: Springer Book Archive