{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:29:32Z","timestamp":1742916572441,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":34,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811668890"},{"type":"electronic","value":"9789811668906"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6890-6_9","type":"book-chapter","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:02:28Z","timestamp":1646488948000},"page":"109-127","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Comprehensive Review of Fraudulent Email Detection Models"],"prefix":"10.1007","author":[{"given":"Hitesh Narayan","family":"Soneji","sequence":"first","affiliation":[]},{"given":"Aniruddh Sajith","family":"Soman","sequence":"additional","affiliation":[]},{"given":"Aniruddh","family":"Vyas","sequence":"additional","affiliation":[]},{"given":"Shubha","family":"Puthran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,6]]},"reference":[{"key":"9_CR1","unstructured":"Tidy J (17 April 2020) Google blocking 18m coronavirus scam emails every day. https:\/\/www.bbc.com\/news\/technology-52319093"},{"key":"9_CR2","unstructured":"Keyworth M, Wall M (8 Jan 2016) The \u2018bogus boss\u2019 email scam costing firms millions. https:\/\/www.bbc.com\/news\/business-35250678"},{"key":"9_CR3","unstructured":"Budanovi\u0107 N (11 Dec 2019) 20 spam statistics that shed light on the dark side of your inbox. https:\/\/dataprot.net\/statistics\/spam-statistics"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Fang Y, Zhang C, Huang C, Liu L, Yang Y (2019) Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism. 2019 IEEE Access 7, 56329\u201356340","DOI":"10.1109\/ACCESS.2019.2913705"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Olatunji SO (2017) Extreme learning machines and support vector machines models for email spam detection. In: 2017 IEEE 30th Canadian conference on electrical and computer engineering (CCECE). Windsor, ON, pp 1\u20136","DOI":"10.1109\/CCECE.2017.7946806"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Tseng C, Chen M (2009) Incremental SVM model for spam detection on dynamic email social networks. In: 2009 international conference on computational science and engineering. Vancouver, BC, pp 128\u2013135","DOI":"10.1109\/CSE.2009.260"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Vyas T, Prajapati P, Gadhwal S (2015) A survey and evaluation of supervised machine learning techniques for spam e-mail filtering. In: 2015 IEEE international conference on electrical, computer and communication technologies (ICECCT). Coimbatore, pp 1\u20137","DOI":"10.1109\/ICECCT.2015.7226077"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"More S, Kulkarni SA (2013) Data mining with machine learning applied for email deception. In: 2013 international conference on optical imaging sensor and security (ICOSS). Coimbatore, pp 1\u20134","DOI":"10.1109\/ICOISS.2013.6678403"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Nandhini S, Marseline DJKS (2020) Performance evaluation of machine learning algorithms for email spam detection. In: 2020 international conference on emerging trends in information technology and engineering (ic-ETITE). Vellore, India, pp 1\u20134","DOI":"10.1109\/ic-ETITE47903.2020.312"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Deshmukh P, Shelar M, Kulkarni N (2014) Detecting of targeted malicious email. In: 2014 IEEE global conference on wireless computing & networking (GCWCN). Lonavala, pp 199\u2013202","DOI":"10.1109\/GCWCN.2014.7030878"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TBDATA.2020.3029209","volume":"2020","author":"Q Li","year":"2020","unstructured":"Li Q, Cheng M, Wang J, Sun B (2020) LSTM based phishing detection for big email data. IEEE Trans Big Data 2020:1\u20131","journal-title":"IEEE Trans Big Data"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Li X, Zhang D, Wu B (2020) Detection method of phishing email based on persuasion principle. In: 2020 IEEE 4th information technology, networking, electronic and automation control conference (ITNEC). Chongqing, China, pp 571\u2013574","DOI":"10.1109\/ITNEC48623.2020.9084766"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Wijaya A, Bisri A (2016) Hybrid decision tree and logistic regression classifier for email spam detection. In: 2016 8th international conference on information technology and electrical engineering (ICITEE). Yogyakarta, pp 1\u20134","DOI":"10.1109\/ICITEED.2016.7863267"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Agarwal K, Kumar T (2018) Email spam detection using integrated approach of na\u00efve bayes and particle swarm optimization. In: 2018 second international conference on intelligent computing and control systems (ICICCS). Madurai, India, pp 685\u2013690","DOI":"10.1109\/ICCONS.2018.8662957"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Peng W, Huang L, Jia J, Ingram E (2018) Enhancing the naive bayes spam filter through intelligent text modification detection. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications\/12th IEEE international conference on big data science and engineering (TrustCom\/BigDataSE). New York, NY, pp 849\u2013854","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00122"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Singh AK, Bhushan S, Vij S (2019) Filtering spam messages and mails using fuzzy C means algorithm. In: 2019 4th international conference on internet of things: smart innovation and usages (IoT-SIU). Ghaziabad, India, pp 1\u20135","DOI":"10.1109\/IoT-SIU.2019.8777483"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Moradpoor N, Clavie B, Buchanan B (2017) Employing machine learning techniques for detection and classification of phishing emails. In: 2017 computing conference. London, pp 149\u2013156","DOI":"10.1109\/SAI.2017.8252096"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Panigrahi PK (2012) A comparative study of supervised machine learning techniques for spam e-mail filtering. In: 2012 fourth international conference on computational intelligence and communication networks. Mathura, pp 506\u2013512","DOI":"10.1109\/CICN.2012.14"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Nizamani S, Memon N, Glasdam M, Nguyen DD (2014) Detection of fraudulent emails by employing advanced feature abundance, pp 169\u2013174","DOI":"10.1016\/j.eij.2014.07.002"},{"key":"9_CR20","unstructured":"Unnithan NA, Harikrishnan NB, Vinayakumar R, Soman KP, Sundarakrishna S (2018) Detecting phishing E-mail using machine learning techniques CEN-secureNLP. In: 2018 proceedings of the 1st anti-phishing shared task pilot 4th ACM IWSPA Co-Located 8th ACM conference data application security privacy (CODASPY), pp 51\u201354"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Alotaibi R, Al-Turaiki I, Alakeel F (2020) Mitigating email phishing attacks using convolutional neural networks. In: 2020 3rd international conference on computer applications & information security (ICCAIS). Riyadh, Saudi Arabia, pp 1\u20136","DOI":"10.1109\/ICCAIS48893.2020.9096821"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Habib M, Faris H, Hassonah MA, Alqatawna J, Sheta AF, Al-Zoubi AM (2019) Automatic email spam detection using genetic programming with SMOTE. In: 2018 fifth HCT information technology trends (ITT). Dubai, United Arab Emirates, pp 185\u2013190","DOI":"10.1109\/CTIT.2018.8649534"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Yu G, Fan W, Huang W, An J (2020) An explainable method of phishing emails generation and its application in machine learning. In: 2020 IEEE 4th information technology, networking, electronic and automation control conference (ITNEC). Chongqing, China, pp 1279\u20131283","DOI":"10.1109\/ITNEC48623.2020.9085171"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Chen R, Zhang C, Guo J, Wang X (2019) Application of naive bayesian algorithms in E-mail classification. In: 2019 Chinese automation congress (CAC). Hangzhou, China, pp 3933\u20133938","DOI":"10.1109\/CAC48633.2019.8997251"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Prilepok M, Kudelka M (2015) Spam detection based on nearest community classifier. In: 2015 international conference on intelligent networking and collaborative systems. Taipei, pp 354\u2013359","DOI":"10.1109\/INCoS.2015.75"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Bagui S, Nandi D, Bagui S, White RJ (2019) Classifying phishing email using machine learning and deep learning. In: 2019 international conference on cyber security and protection of digital services (cyber security). Oxford, United Kingdom, pp 1\u20132","DOI":"10.1109\/CyberSecPODS.2019.8885143"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Alurkar AA, et al (2017) A proposed data science approach for email spam classification using machine learning techniques. In: 2017 internet of things business models, users, and networks. Copenhagen, pp 1\u20135","DOI":"10.1109\/CTTE.2017.8260935"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Niu W, Zhang X, Yang G, Ma Z, Zhuo Z (2017) Phishing emails detection using CS-SVM. In: 2017 IEEE international symposium on parallel and distributed processing with applications and 2017 IEEE international conference on ubiquitous computing and communications (ISPA\/IUCC). Guangzhou, pp 1054\u20131059","DOI":"10.1109\/ISPA\/IUCC.2017.00160"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Zaid A, Alqatawna J, Huneiti A (2016) A proposed model for malicious spam detection in email systems of educational institutes. In: 2016 cybersecurity and cyberforensics conference (CCC). Amman, pp 60\u201364","DOI":"10.1109\/CCC.2016.24"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Bin S, Razak A, Bin Mohamad AF (2013) Identification of spam email based on information from email header. In: 2013 13th international conference on intellient systems design and applications. Bangi, pp 347\u2013353","DOI":"10.1109\/ISDA.2013.6920762"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Sanchez F, Duan Z (2012) A sender-centric approach to detecting phishing emails. In:2012 international conference on cyber security. Washington, DC, pp 32\u201339","DOI":"10.1109\/CyberSecurity.2012.11"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Azeez NA, Oluwatosin A (2016) CyberProtector: identifying compromised URLs in electronic mails with bayesian classification. In: 2016 international conference on computational science and computational intelligence (CSCI). Las Vegas, NV, pp 959\u2013965","DOI":"10.1109\/CSCI.2016.0184"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Hajgude J, Ragha L (2012) Phish mail guard: phishing mail detection technique by using textual and URL analysis. In: 2012 world congress on information and communication technologies. Trivandrum, pp 297\u2013302","DOI":"10.1109\/WICT.2012.6409092"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Vishagini V, Rajan AK (2018) An improved spam detection method with weighted support vector machine. In: 2018 international conference on data science and engineering (ICDSE). Kochi, pp 1\u20135","DOI":"10.1109\/ICDSE.2018.8527737"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Seventh International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6890-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:03:15Z","timestamp":1646488995000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6890-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811668890","9789811668906"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6890-6_9","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}