Elektronik postanın (e-posta) hızlı ve kolay bir haberleşme aracı olması, insanlar tarafından iletişimde yoğun şekilde kullanılmasına neden olmaktadır. E-postanın bu özellikleri; reklam yapmak, fikirlerini insanlara duyurmak ve çeşitli istismar çalışmaları yapmak isteyen insanlar için bir cazibe merkezi olmasını sağlamaktadır. Bu tür girişimler de bir güvenlik zafiyeti oluşturmaktadır. Temelleri Vladimir N. Vapnik tarafından atılan bir makine öğrenme algoritması olan destek vektör makineleri 1995’den itibaren sınıflandırma ve eğri uydurma problemlerinde başarılı sonuçlar vermiştir. Bu çalışmada, destek vektör makineleri kullanılarak yaramaz (istenmeyen) e-postaların filtrelenmesi işlemi gerçekleştirilmiştir.
Yaramaz (İstenmeyen e-posta) destek vektör makinesi filtreler öznitelik çekirdek fonksiyonları
Electronic mail (e-mail) is a communication medium that is fast and easy to use, making people to use it frequently. These features of e-mail cause it to be the center of attraction for the people who want to advertise, share their ideas with others or involve in malicious activities. Thus, these kind of activities create security threats. Support vector machines are machine learning algorithms that are developed by Vladimir N. Vapnik and produce successful results in several application domains such as clustering and curve fitting problem. In this study, we carry out unwanted (spam) e-mail filtering using support vector machine.
Other ID | JA37KR26AB |
---|---|
Journal Section | Makaleler(Araştırma) |
Authors | |
Publication Date | June 24, 2016 |
Published in Issue | Year 2013 Volume: 6 Issue: 1 |
Article Acceptance
Use user registration/login to upload articles online.
The acceptance process of the articles sent to the journal consists of the following stages:
1. Each submitted article is sent to at least two referees at the first stage.
2. Referee appointments are made by the journal editors. There are approximately 200 referees in the referee pool of the journal and these referees are classified according to their areas of interest. Each referee is sent an article on the subject he is interested in. The selection of the arbitrator is done in a way that does not cause any conflict of interest.
3. In the articles sent to the referees, the names of the authors are closed.
4. Referees are explained how to evaluate an article and are asked to fill in the evaluation form shown below.
5. The articles in which two referees give positive opinion are subjected to similarity review by the editors. The similarity in the articles is expected to be less than 25%.
6. A paper that has passed all stages is reviewed by the editor in terms of language and presentation, and necessary corrections and improvements are made. If necessary, the authors are notified of the situation.
. This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.