{"id":"https://openalex.org/W2041403338","doi":"https://doi.org/10.1145/1858378.1858431","title":"An intelligent technique to detect file formats and e-mail spam","display_name":"An intelligent technique to detect file formats and e-mail spam","publication_year":2010,"publication_date":"2010-09-16","ids":{"openalex":"https://openalex.org/W2041403338","doi":"https://doi.org/10.1145/1858378.1858431","mag":"2041403338"},"language":"en","primary_location":{"id":"doi:10.1145/1858378.1858431","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1858378.1858431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011420827","display_name":"R. Dhanalakshmi","orcid":null},"institutions":[{"id":"https://openalex.org/I33585257","display_name":"Anna University, Chennai","ror":"https://ror.org/01qhf1r47","country_code":"IN","type":"education","lineage":["https://openalex.org/I33585257"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ranaganayakulu Dhanalakshmi","raw_affiliation_strings":["Anna University, Chennai, TamilNadu, India","Anna university, Chennai, Tamilnadu, India"],"affiliations":[{"raw_affiliation_string":"Anna University, Chennai, TamilNadu, India","institution_ids":["https://openalex.org/I33585257"]},{"raw_affiliation_string":"Anna university, Chennai, Tamilnadu, India","institution_ids":["https://openalex.org/I33585257"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084554838","display_name":"C. Chellappan","orcid":null},"institutions":[{"id":"https://openalex.org/I33585257","display_name":"Anna University, Chennai","ror":"https://ror.org/01qhf1r47","country_code":"IN","type":"education","lineage":["https://openalex.org/I33585257"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Chenniappan Chellappan","raw_affiliation_strings":["Anna University, Chennai, TamilNadu, India","Anna university, Chennai, Tamilnadu, India"],"affiliations":[{"raw_affiliation_string":"Anna University, Chennai, TamilNadu, India","institution_ids":["https://openalex.org/I33585257"]},{"raw_affiliation_string":"Anna university, Chennai, Tamilnadu, India","institution_ids":["https://openalex.org/I33585257"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011420827"],"corresponding_institution_ids":["https://openalex.org/I33585257"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.14333533,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8275411128997803},{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.6183461546897888},{"id":"https://openalex.org/keywords/computer-file","display_name":"Computer file","score":0.5806946158409119},{"id":"https://openalex.org/keywords/file-sharing","display_name":"File sharing","score":0.5642661452293396},{"id":"https://openalex.org/keywords/file-format","display_name":"File format","score":0.5443190932273865},{"id":"https://openalex.org/keywords/torrent-file","display_name":"Torrent file","score":0.5257866382598877},{"id":"https://openalex.org/keywords/directory","display_name":"Directory","score":0.48984310030937195},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.45738711953163147},{"id":"https://openalex.org/keywords/file-system-fragmentation","display_name":"File system fragmentation","score":0.4253320097923279},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3803871273994446},{"id":"https://openalex.org/keywords/stub-file","display_name":"Stub file","score":0.361747145652771},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3427599370479584},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.30471450090408325},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.2487412393093109},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.24159753322601318},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.23552539944648743}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8275411128997803},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.6183461546897888},{"id":"https://openalex.org/C95637964","wikidata":"https://www.wikidata.org/wiki/Q82753","display_name":"Computer file","level":2,"score":0.5806946158409119},{"id":"https://openalex.org/C551386961","wikidata":"https://www.wikidata.org/wiki/Q22666","display_name":"File sharing","level":3,"score":0.5642661452293396},{"id":"https://openalex.org/C97250363","wikidata":"https://www.wikidata.org/wiki/Q235557","display_name":"File format","level":2,"score":0.5443190932273865},{"id":"https://openalex.org/C40350719","wikidata":"https://www.wikidata.org/wiki/Q2451637","display_name":"Torrent file","level":4,"score":0.5257866382598877},{"id":"https://openalex.org/C2777683733","wikidata":"https://www.wikidata.org/wiki/Q201456","display_name":"Directory","level":2,"score":0.48984310030937195},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.45738711953163147},{"id":"https://openalex.org/C26656859","wikidata":"https://www.wikidata.org/wiki/Q4089244","display_name":"File system fragmentation","level":4,"score":0.4253320097923279},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3803871273994446},{"id":"https://openalex.org/C13674803","wikidata":"https://www.wikidata.org/wiki/Q7627301","display_name":"Stub file","level":3,"score":0.361747145652771},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3427599370479584},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.30471450090408325},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2487412393093109},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24159753322601318},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23552539944648743}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1858378.1858431","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1858378.1858431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"id":"https://metadata.un.org/sdg/3","display_name":"Good health and well-being"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1586893296","https://openalex.org/W1603441233","https://openalex.org/W2024871791","https://openalex.org/W2029030635","https://openalex.org/W2031685798","https://openalex.org/W2047981652","https://openalex.org/W2071484336","https://openalex.org/W2099606292","https://openalex.org/W2101347959","https://openalex.org/W2122956713","https://openalex.org/W2126985156","https://openalex.org/W2127262221","https://openalex.org/W2132022533","https://openalex.org/W2137833784","https://openalex.org/W2151958475","https://openalex.org/W2153052135","https://openalex.org/W2167492558","https://openalex.org/W2169384781","https://openalex.org/W3130685565"],"related_works":["https://openalex.org/W1990666357","https://openalex.org/W2090783200","https://openalex.org/W2342627122","https://openalex.org/W2558192934","https://openalex.org/W4313226861","https://openalex.org/W2023412278","https://openalex.org/W4210915796","https://openalex.org/W130417735","https://openalex.org/W84738009","https://openalex.org/W2354260768"],"abstract_inverted_index":{"With":[0],"the":[1,14,22,71,75,81,90,93,96,118,130,142,147,151,158,168,172,181,193,221,240,270,281,291],"everyday":[2],"increasing":[3],"importance":[4],"of":[5,11,24,49,64,120,144,175,223,243,272,294],"privacy,":[6],"security,":[7],"and":[8,101,207,234,238,251,258,278],"wise":[9],"use":[10],"computational":[12],"resources,":[13],"corresponding":[15],"technologies":[16],"are":[17,32],"increasingly":[18],"being":[19,178],"faced":[20],"with":[21,74],"problem":[23,132,216],"file":[25,34,44,72,76,87,94,121,169,176,194],"type":[26,77,108,127,143,177,195],"detection.":[27],"In":[28],"digital":[29],"forensic,":[30],"there":[31],"numerous":[33],"formats":[35,45],"in":[36,80,95,113,275,286],"use.":[37],"Criminals":[38],"have":[39],"started":[40],"using":[41],"either":[42],"non-standard":[43],"or":[46,53,149,156,188],"changing":[47,192],"extensions":[48],"files":[50,66],"while":[51],"storing":[52],"transmitting":[54],"them":[55],"over":[56],"a":[57,86,227,260],"network.":[58],"This":[59,163],"makes":[60],"recovering":[61],"data":[62],"out":[63],"these":[65],"difficult.":[67],"An":[68],"extension":[69],"to":[70,105,140,184,203,236,262],"name":[73],"is":[78,88,110,138,154],"stored":[79],"disk":[82],"directory,":[83],"but":[84],"when":[85],"deleted,":[89],"entry":[91],"for":[92],"directory":[97],"may":[98,133],"be":[99,134,201],"overwritten":[100],"hence":[102],"quite":[103],"difficult":[104,139],"identify":[106,141],"its":[107,123,284],"which":[109],"serious":[111],"issue":[112],"computer":[114],"forensics.":[115],"But":[116,136],"if":[117,150],"fragment":[119,145],"has":[122,212],"header":[124,152],"information":[125,129,153,190],"containing":[126],"identifying":[128,167],"mentioned":[131],"solved.":[135],"it":[137,247],"from":[146],"middle":[148],"deleted":[155],"unavailable":[157],"identification":[159],"becomes":[160],"more":[161],"complex.":[162],"paper":[164],"focuses":[165],"on":[166,290],"types":[170],"addressing":[171],"various":[173],"scenarios":[174],"changed":[179],"by":[180,191,198,269],"malicious":[182],"user":[183],"send":[185],"some":[186],"confidential":[187],"sensitive":[189],"(say.exe":[196],"banned":[197],"Gmail":[199],"can":[200,218],"converted":[202],"any":[204],"acceptable":[205],"format":[206],"sent":[208],"across).":[209],"E-mail":[210],"spam":[211,288],"become":[213],"an":[214],"epidemic":[215],"that":[217],"negatively":[219],"affect":[220],"usability":[222],"electronic":[224],"mail":[225],"as":[226],"communication":[228],"means.":[229],"Besides":[230],"wasting":[231],"users'":[232],"time":[233],"effort":[235],"scan":[237],"delete":[239],"massive":[241],"amount":[242],"junk":[244],"e-mails":[245],"received,":[246],"consumes":[248],"network":[249],"bandwidth":[250],"storage":[252],"space,":[253],"slows":[254],"down":[255],"email":[256],"servers,":[257],"provides":[259],"medium":[261],"distribute":[263],"harmful":[264],"and/or":[265],"offensive":[266],"content.":[267],"Inspired":[268],"success":[271],"fuzzy":[273],"similarity":[274],"text":[276],"classification":[277],"document":[279],"retrieval,":[280],"approach":[282],"investigates":[283],"effectiveness":[285],"filtering":[287],"based":[289],"textual":[292],"content":[293],"e-mail":[295],"messages.":[296]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
