Sciweavers

225 search results - page 14 / 45
» Spam, spam, spam, spam: how can we stop it
Sort
View
CEAS
2005
Springer
14 years 1 months ago
Stopping Outgoing Spam by Examining Incoming Server Logs
Processing server logs for the email arriving at an ISP can be used to detect remote sites where machines are infected by email viruses or have been hijacked and used for sending ...
Richard Clayton
HICSS
2006
IEEE
86views Biometrics» more  HICSS 2006»
14 years 1 months ago
Effective Anti-Spam Strategies in Companies: An International Study
While spam is considered a crucial problem for both companies and ordinary computer users, little is known about how spam actually affects companies and which anti-spam techniques...
Mikko T. Siponen, Carl Stucke
ECIR
2006
Springer
13 years 9 months ago
Filtering Obfuscated Email Spam by means of Phonetic String Matching
Rule-based email filters mainly rely on the occurrence of critical words to classify spam messages. However, perceptive obfuscation techniques can be used to elude exact pattern ma...
Valerio Freschi, Andrea Seraghiti, Alessandro Bogl...
IJCAI
2007
13 years 9 months ago
Dynamically Weighted Hidden Markov Model for Spam Deobfuscation
Spam deobfuscation is a processing to detect obfuscated words appeared in spam emails and to convert them back to the original words for correct recognition. Lexicon tree hidden M...
Seunghak Lee, Iryoung Jeong, Seungjin Choi
SAC
2009
ACM
14 years 6 days ago
Spam decisions on gray e-mail using personalized ontologies
E-mail is one of the most common communication methods among people on the Internet. However, the increase of e-mail misuse/abuse has resulted in an increasing volume of spam e-ma...
Seongwook Youn, Dennis McLeod