期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution 被引量:4
1
作者 Jafar Alqatawna Hossam Faris +2 位作者 Khalid Jaradat malek al-zewairi Omar Adwan 《International Journal of Communications, Network and System Sciences》 2015年第5期118-129,共12页
Spam is no longer just commercial unsolicited email messages that waste our time, it consumes network traffic and mail servers’ storage. Furthermore, spam has become a major component of several attack vectors includ... Spam is no longer just commercial unsolicited email messages that waste our time, it consumes network traffic and mail servers’ storage. Furthermore, spam has become a major component of several attack vectors including attacks such as phishing, cross-site scripting, cross-site request forgery and malware infection. Statistics show that the amount of spam containing malicious contents increased compared to the one advertising legitimate products and services. In this paper, the issue of spam detection is investigated with the aim to develop an efficient method to identify spam email based on the analysis of the content of email messages. We identify a set of features that have a considerable number of malicious related features. Our goal is to study the effect of these features in helping the classical classifiers in identifying spam emails. To make the problem more challenging, we developed spam classification models based on imbalanced data where spam emails form the rare class with only 16.5% of the total emails. Different metrics were utilized in the evaluation of the developed models. Results show noticeable improvement of spam classification models when trained by dataset that includes malicious related features. 展开更多
关键词 SPAM E-MAIL MALICIOUS SPAM SPAM Detection SPAM FEATURES Security Mechanism Data Mining
下载PDF
Agile Software Development Methodologies: Survey of Surveys
2
作者 malek al-zewairi Mariam Biltawi +1 位作者 Wael Etaiwi Adnan Shaout 《Journal of Computer and Communications》 2017年第5期74-97,共24页
Agile software design and development methodologies have been gaining rigorous attention in the software engineering research community since their early introduction in the mid-nineties in addition to being highly ad... Agile software design and development methodologies have been gaining rigorous attention in the software engineering research community since their early introduction in the mid-nineties in addition to being highly adopted by the software development industry. In the last 15 years, an excessive number of research studies have been conducted on agile methods, a great number of notable methods have been proposed and various surveys have been presented by many researchers. In this study, the authors intend to conduct a literature survey study of the surveys of the different agile methodologies ranging from January 2000 to December 2015 using an intuitive research methodology called “Compare and Review” (CR). Furthermore, these survey papers were classified into four major categories according to their area of study. Additionally, the newly proposed agile methodologies that have not been addressed yet in any other literature review were reviewed and compared in terms of where the changes that they proposed lay on the SDLC. 展开更多
关键词 AGILE Software Methods SURVEY COMPARE and REVIEW Research METHODOLOGY
下载PDF
Ultrasurf Traffic Classification: Detection and Prevention
3
作者 Raed Al-Qura’n Ali Hadi +1 位作者 Jalal Atoum malek al-zewairi 《International Journal of Communications, Network and System Sciences》 2015年第8期304-311,共8页
Anti-censorship applications are becoming increasingly popular mean to circumvent Internet censorship, whether imposed by governments seeking to control the flow of information available to their citizens, or by paren... Anti-censorship applications are becoming increasingly popular mean to circumvent Internet censorship, whether imposed by governments seeking to control the flow of information available to their citizens, or by parental figures wishing to shield their “parishioners” from the dangers of the Internet, or in organizations trying to restrict the Internet usage within their networking territory. Numerous applications are readily accessible for the average user to aid-in bypassing Internet censorship. Several technologies and techniques are associated with the formation of these applications, whereas, each of these applications deploys its unique mechanism to circumvent Internet censorship. Using anti-censorship applications in the work environment can have a negative impact on the network, leading to excessive degradation in the bandwidth, immense consumption of the Internet data usage capacity and possibly open the door for security breaches. Triumphing the war on anti-censorship applications has become more difficult to achieve at the network level due to the rapid updates and the adopted new technologies to circumvent censorship. In this study, a comprehensive overview on Internet censorship and anti-censorship applications is provided by analyzing Ultrasurf behavior, classifying its traffic patterns and proposing a behavioral-based solution that is capable of detecting and preventing the Ultrasurf traffic at the network level. 展开更多
关键词 INTERNET CENSORSHIP Circumvention PROXY AVOIDANCE Ultrasurf
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部