{"title":"Learning to Classify Threaten E-mail","authors":"S. Balamurugan, R. Rajaram","doi":"10.1109/AMS.2008.100","DOIUrl":null,"url":null,"abstract":"In this paper we study supervised classification of e-mails. We consider the task of threaten e-mail detection (i.e. email related to terrorism, fraud, etc.). In this supervised learning setting, we investigate the use of data mining classifiers for automatic threaten e-mail detection. We show that decision tree is a good choice for this task as it runs fast on large and high dimensional databases, is easy to tune and is highly accurate, outperforming popular algorithms such as support vector machines, Naive Bayes. In particular, we are interested in detecting fraudulent and possibly criminal activities from such e-mails.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AMS.2008.100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
In this paper we study supervised classification of e-mails. We consider the task of threaten e-mail detection (i.e. email related to terrorism, fraud, etc.). In this supervised learning setting, we investigate the use of data mining classifiers for automatic threaten e-mail detection. We show that decision tree is a good choice for this task as it runs fast on large and high dimensional databases, is easy to tune and is highly accurate, outperforming popular algorithms such as support vector machines, Naive Bayes. In particular, we are interested in detecting fraudulent and possibly criminal activities from such e-mails.