Sciweavers

CEAS
2007
Springer
14 years 6 months ago
Slicing Spam with Occam's Razor
To evade blacklisting, the vast majority of spam email is sent from exploited MTAs (i.e., botnets) and with forged “From” addresses. In response, the anti-spam community has d...
Chris Fleizach, Geoffrey M. Voelker, Stefan Savage
CEAS
2007
Springer
14 years 6 months ago
Email Communities of Interest
Email has become an integral and sometimes overwhelming part of users’ personal and professional lives. In this paper, we measure the flow and frequency of user email toward th...
Lisa Johansen, Michael Rowell, Kevin R. B. Butler,...
CEAS
2007
Springer
14 years 6 months ago
Hardening Fingerprinting by Context
Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approache...
Aleksander Kolcz, Abdur Chowdhury
CEAS
2007
Springer
14 years 6 months ago
Combining Global and Personal Anti-Spam Filtering
Many of the first successful applications of statistical learning to anti-spam filtering were personalized classifiers that were trained on an individual user’s spam and ham ...
Richard Segal
CEAS
2007
Springer
14 years 6 months ago
Characterizing Web Spam Using Content and HTTP Session Analysis
Web spam research has been hampered by a lack of statistically significant collections. In this paper, we perform the first large-scale characterization of web spam using conten...
Steve Webb, James Caverlee, Calton Pu
CEAS
2007
Springer
14 years 6 months ago
A Game-Theoretic Investigation of the Effect of Human Interactive Proofs on Spam E-mail
We show how a game-theoretic model of spam e-mailing, which we had introduced in previous work, can be extended to include the possibility of employing Human Interactive Proofs (h...
Dimitrios K. Vassilakis, Ion Androutsopoulos, Evan...
CEAS
2007
Springer
14 years 6 months ago
Image Spam Filtering by Content Obscuring Detection
We address the problem of filtering image spam, a rapidly spreading kind of spam in which the text message is embedded into attached images to defeat spam filtering techniques b...
Battista Biggio, Giorgio Fumera, Ignazio Pillai, F...
CEAS
2007
Springer
14 years 6 months ago
Email traffic: a quantitative snapshot
Richard Clayton
CEAS
2007
Springer
14 years 6 months ago
Is Britney Spears Spam?
Aaron Zinman, Judith S. Donath
CEAS
2007
Springer
14 years 6 months ago
Phishing Attacks: Analyzing Trends in 2006
Zulfikar Ramzan, Candid Wueest