Sciweavers

100 search results - page 10 / 20
» Spam the spammer
Sort
View
CEAS
2005
Springer
14 years 1 months ago
Spam Deobfuscation using a Hidden Markov Model
To circumvent spam filters, many spammers attempt to obfuscate their emails by deliberately misspelling words or introducing other errors into the text. For example viagra may be...
Honglak Lee, Andrew Y. Ng
CCS
2006
ACM
13 years 11 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
CEAS
2008
Springer
13 years 9 months ago
A Survey of Modern Spam Tools
Over the past 5 years, spam sending technology has improved dramatically. Static messages sent opportunistically through misconfigured hosts have evolved into dynamically generate...
Henry Stern
AAAI
2012
11 years 10 months ago
Discovering Spammers in Social Networks
As the popularity of the social media increases, as evidenced in Twitter, Facebook and China’s Renren, spamming activities also picked up in numbers and variety. On social netwo...
Yin Zhu, Xiao Wang, ErHeng Zhong, Nathan Nan Liu, ...
CN
2007
88views more  CN 2007»
13 years 7 months ago
DMTP: Controlling spam through message delivery differentiation
Unsolicited commercial email, commonly known as spam, has become a pressing problem in today’s Internet. In this paper we re-examine the architectural foundations of the current...
Zhenhai Duan, Yingfei Dong, Kartik Gopalan