Sciweavers

100 search results - page 4 / 20
» Spam the spammer
Sort
View
SAINT
2009
IEEE
14 years 2 months ago
Analyzing the Aftermath of the McColo Shutdown
This paper examines how spam behavior was impacted by the shutdown of McColo, a service provider known for its lax security enforcement. Since the shutdown, a variety of sources h...
Steve DiBenedetto, Daniel Massey, Christos Papadop...
FLAIRS
2008
13 years 10 months ago
On Using SVM and Kolmogorov Complexity for Spam Filtering
As a side effect of e-marketing strategy the number of spam e-mails is rocketing, the time and cost needed to deal with spam as well. Spam filtering is one of the most difficult t...
Sihem Belabbes, Gilles Richard
ICASSP
2010
IEEE
13 years 7 months ago
A nonnegative sparsity induced similarity measure with application to cluster analysis of spam images
Image spam is an email spam that embeds text content into graphical images to bypass traditional spam filters. The majority of previous approaches focus on filtering image spam ...
Yan Gao, Alok N. Choudhary, Gang Hua
ICASSP
2009
IEEE
13 years 5 months ago
Image spam filtering using Fourier-Mellin invariant features
Image spam is a new obfuscating method which spammers invented to more effectively bypass conventional text based spam filters. In this paper, a framework for filtering image spam...
Haiqiang Zuo, Xi Li, Ou Wu, Weiming Hu, Guan Luo
COMPSAC
2009
IEEE
14 years 2 months ago
Penetration Testing for Spam Filters
Despite all the advances on techniques to block spam e-mail messages we still receive them on a frequent basis. This is due mainly to the ability of the spammers to modify the mes...
Yugesh Madhavan, João W. Cangussu, Ram Dant...