Enaitz Ezpeleta

According to our database1, Enaitz Ezpeleta authored at least 16 papers between 2010 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.



In proceedings 
PhD thesis 


Online presence:

On csauthors.net:


SDRS: A new lossless dimensionality reduction for text corpora.
Inf. Process. Manag., 2020

Novel email spam detection method using sentiment analysis and personality recognition.
Log. J. IGPL, 2020

Who's There? Evaluating Data Source Integrity and Veracity in IIoT Using Multivariate Statistical Process Control.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

Nuevos Paradigmas de Análisis Basados en Contenidos para la Detección del Spam en RRSS.
Proces. del Leng. Natural, 2018

A Mood Analysis on Youtube Comments and a Method for Improved Social Spam Detection.
Proceedings of the Hybrid Artificial Intelligent Systems - 13th International Conference, 2018

Short Messages Spam Filtering Combining Personality Recognition and Sentiment Analysis.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2017

A study of the personalization of spam content using Facebook public information.
Log. J. IGPL, 2017

Novel Comment Spam Filtering Method on Youtube: Sentiment Analysis and Personality Recognition.
Proceedings of the Current Trends in Web Engineering, 2017

Using Personality Recognition Techniques to Improve Bayesian Spam Filtering.
Proces. del Leng. Natural, 2016

Short Messages Spam Filtering Using Sentiment Analysis.
Proceedings of the Text, Speech, and Dialogue - 19th International Conference, 2016

Does Sentiment Analysis Help in Bayesian Spam Filtering?
Proceedings of the Hybrid Artificial Intelligent Systems - 11th International Conference, 2016

Short Messages Spam Filtering Using Personality Recognition.
Proceedings of the 4th Spanish Conference on Information Retrieval, 2016

An Analysis of the Effectiveness of Personalized Spam Using Online Social Network Public Information.
Proceedings of the International Joint Conference, 2015

Classification of SSH Anomalous Connections.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Visualization of Misuse-Based Intrusion Detection: Application to Honeynet Data.
Proceedings of the Soft Computing Models in Industrial and Environmental Applications, 2011

Understanding Honeypot Data by an Unsupervised Neural Visualization.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010