Sciweavers

100 search results - page 2 / 20
» Spam the spammer
Sort
View
ICC
2009
IEEE
142views Communications» more  ICC 2009»
14 years 2 months ago
Revealing Social Networks of Spammers Through Spectral Clustering
—To date, most studies on spam have focused only on the spamming phase of the spam cycle and have ignored the harvesting phase, which consists of the mass acquisition of email ad...
Kevin S. Xu, Mark Kliger, Yilun Chen, Peter J. Woo...
ELPUB
2007
ACM
13 years 11 months ago
The Fight against Spam - A Machine Learning Approach
The paper presents a brief survey of the fight between spammers and antispam software developers, and also describes new approaches to spam filtering. In the first two sections we...
Karel Jezek, Jiri Hynek
WWW
2011
ACM
13 years 2 months ago
Detecting group review spam
It is well-known that many online reviews are not written by genuine users of products, but by spammers who write fake reviews to promote or demote some target products. Although ...
Arjun Mukherjee, Bing Liu, Junhui Wang, Natalie S....
CORR
2010
Springer
268views Education» more  CORR 2010»
13 years 7 months ago
Bayesian Based Comment Spam Defending Tool
Spam messes up user's inbox, consumes network resources and spread worms and viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is called blog spam or c...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
ECRIME
2007
13 years 11 months ago
Fighting unicode-obfuscated spam
In the last few years, obfuscation has been used more and more by spammers to make spam emails bypass filters. The standard method is to use images that look like text, since typi...
Changwei Liu, Sid Stamm