Sciweavers

225 search results - page 4 / 45
» Spam, spam, spam, spam: how can we stop it
Sort
View
CCS
2006
ACM
13 years 11 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
ACL
2009
13 years 5 months ago
The Contribution of Stylistic Information to Content-based Mobile Spam Filtering
Content-based approaches to detecting mobile spam to date have focused mainly on analyzing the topical aspect of a SMS message (what it is about) but not on the stylistic aspect (...
Dae-Neung Sohn, Jung-Tae Lee, Hae-Chang Rim
INFOCOM
2011
IEEE
12 years 11 months ago
Prevalence and mitigation of forum spamming
—Forums on the Web are increasingly spammed by miscreants in order to attract visitors to their (often malicious) websites. In this paper, we study the prevalence of forum spammi...
Youngsang Shin, Minaxi Gupta, Steven A. Myers
WEBDB
2004
Springer
100views Database» more  WEBDB 2004»
14 years 25 days ago
Spam, Damn Spam, and Statistics: Using Statistical Analysis to Locate Spam Web Pages
The increasing importance of search engines to commercial web sites has given rise to a phenomenon we call “web spam”, that is, web pages that exist only to mislead search eng...
Dennis Fetterly, Mark Manasse, Marc Najork
SAINT
2009
IEEE
14 years 2 months ago
Analyzing the Aftermath of the McColo Shutdown
This paper examines how spam behavior was impacted by the shutdown of McColo, a service provider known for its lax security enforcement. Since the shutdown, a variety of sources h...
Steve DiBenedetto, Daniel Massey, Christos Papadop...