

IHASS: Intelligent and Hybrid Anti-Spam System |
Pages: 115-125 (11) | [Full Text] PDF (789 KB) |
S Abdulla, A Altaher |
College of Education, Instructional and Learning Technology Depart, Sultan Qaboos University, OmanFaculty of Computing and Information Technology in Rabigh, King Abdulaziz University, Saudi Arabia |
Abstract - Spam emails are increasing continually and represent real threat to internet community. Email spammers use advanced software techniques to send millions of spam emails across the internet to distribute announcements of services and items to obtain commercial benefits. Spam detection became a challenge and most of the existing spam detection techniques are based on content-based filtering (CBF) which have many drawbacks. This paper aims to solve these CBF drawbacks by introducing designing, implementing, and evaluating a novel CBF approach for automatic detection of spam emails. The proposed approach is denoted as Intelligent and Hybrid Anti-Spam System. Its main theme is the neuro-fuzzy inference engine which has been applied successfully in a wide range of research. Initially, a normalization task is performed to remove any deceptive character from the text body. The preparation stage then examined the content of well-known datasets of spam emails to identify all the phrases that solely identify spam email. Our experiments show that IHASS could achieve very good accuracy level and works stably well. |
Index Terms - Spam email detection, content-based filtering, neuro-fuzzy inference engine, kNN-based Evolving Neuro-Fuzzy Inference System |
C itation - S Abdulla, A Altaher. "IHASS: Intelligent and Hybrid Anti-Spam System." International Journal of Computer Networks and Communications Security 6, no. 6 (2018): 115-125. |
Improving Security and Performance in the TOR Network |
Pages: 126-129 (4) | [Full Text] PDF (173 KB) |
DS Fadhil, AI Rasul, YA Muhammed |
Department of Computer Science, Faculty of Science, Soran University, Kurdistan Region, Iraq |
Abstract - TOR software covers the browsers securely. This option makes the journalists, militants and some authorities to be unknown over internet. TOR (onion router) is very successful in low latency anonymous communication. TOR gives more benefits like untraceable network to both local adversary controlling a small network and companies that are low enough to support anonymous use and also remote login. There is other software like AN.ON, crowds and anonymiser.com also provide anonymous communication over networks but TOR software had proved its efficiency in the networking market especially in field of network security ,The IP addresses will be hidden in the server. |
Index Terms - TOR network, authentication, IP hidden in the server |
C itation - DS Fadhil, AI Rasul, YA Muhammed. "Improving Security and Performance in the TOR Network." International Journal of Computer Networks and Communications Security 6, no. 6 (2018): 126-129. |
Energy Efficiency through Dynamic Packet Transmissions in Sensor Network |
Pages: 130-136 (7) | [Full Text] PDF (347 KB) |
Mohammed S. Al-kahtani |
Dept. of Computer Engineering, Prince Sattam bin Abdulaziz University, Saudi Arabia |
Abstract - The work presented in this study proposes an efficient mechanism to reduce the computational and communicational costs associated with sensor network models. Specifically, the study focuses on two different models or topologies, each consisting of three different methods of data transmission for the purpose of reducing the interaction among network nodes when data measured at some instant, t-1, is equal to the data sensed at later instant, t. In terms of the model configurations, the simulation-based approach used to validate our proposed technique indicates that scenarios where member nodes of a cluster was not needed for computation required for less resources for data transmission with increased energy consumption than scenarios that required both member nodes and cluster heads for computation. |
Index Terms - Sensor Network; Packet transmission; Single-hop; Multi-hop; Energy Efficiency |
C itation - Mohammed S. Al-kahtani. "Energy Efficiency through Dynamic Packet Transmissions in Sensor Network." International Journal of Computer Networks and Communications Security 6, no. 6 (2018): 130-136. |