Sciweavers

225 search results - page 26 / 45
» Spam, spam, spam, spam: how can we stop it
Sort
View
SAINT
2002
IEEE
14 years 15 days ago
Internet Mail Transfer and Check System Based on Intelligence Mobile Agents
The Simple Mail Transfer Protocol (SMTP) based E-mail system is the most popular application in today’s Internet world, but there are many dark clouds at the edge of the sunshin...
Li Cheng, Wang Weinong
ICIP
2005
IEEE
14 years 9 months ago
Using visual features for anti-spam filtering
Unsolicited Commercial Email (UCE), also known as spam, has been a major problem on the Internet. In the past, researchers have addressed this problem as a text classification or ...
Ching-Tung Wu, Kwang-Ting Cheng, Qiang Zhu, Yi-Leh...
VIZSEC
2004
Springer
14 years 28 days ago
Email archive analysis through graphical visualization
The analysis of the vast storehouse of email content accumulated or produced by individual users has received relatively little attention other than for specific tasks such as spa...
Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo
CEAS
2007
Springer
14 years 1 months ago
CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation
The growing popularity of IP telephony systems has made them attractive targets for spammers. Voice call spam, also known as Spam over Internet Telephony (SPIT), is potentially a ...
Vijay Balasubramaniyan, Mustaque Ahamad, Haesun Pa...
AICCSA
2005
IEEE
105views Hardware» more  AICCSA 2005»
14 years 1 months ago
Multivariate statistical analysis for network attacks detection
Detection and self-protection against viruses, worms, and network attacks is urgently needed to protect network systems and their applications from catastrophic failures. Once a n...
Guangzhi Qu, Salim Hariri, Mazin S. Yousif