Sciweavers

100 search results - page 15 / 20
» Spam the spammer
Sort
View
CEAS
2008
Springer
13 years 9 months ago
The Effectiveness of Whitelisting: a User-Study
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
David Erickson, Martin Casado, Nick McKeown
CEAS
2007
Springer
14 years 1 months ago
CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation
The growing popularity of IP telephony systems has made them attractive targets for spammers. Voice call spam, also known as Spam over Internet Telephony (SPIT), is potentially a ...
Vijay Balasubramaniyan, Mustaque Ahamad, Haesun Pa...
IEEEARES
2007
IEEE
14 years 1 months ago
A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to new filtering techniques and the lack of incentive for mail domains to filter outg...
Jimmy McGibney, Dmitri Botvich
ICDAR
2005
IEEE
14 years 1 months ago
Image Analysis for Efficient Categorization of Image-based Spam E-mail
To circumvent prevalent text-based anti-spam filters, spammers have begun embedding the advertisement text in images. Analogously, proprietary information (such as source code) ma...
Hrishikesh Aradhye, Gregory K. Myers, James A. Her...
AIRWEB
2008
Springer
13 years 9 months ago
The anti-social tagger: detecting spam in social bookmarking systems
The annotation of web sites in social bookmarking systems has become a popular way to manage and find information on the web. The community structure of such systems attracts spam...
Beate Krause, Christoph Schmitz, Andreas Hotho, Ge...