Sciweavers

CEAS
2008
Springer
13 years 9 months ago
Toward a stochastic speech act model of email behavior
Human interpersonal face-to-face interaction can be considered in terms of successions of speech acts. These are utterances which contain an intention, and the act of creating an ...
John Mildinhall, Jan Noyes
CEAS
2008
Springer
13 years 9 months ago
Do Zebras get more Spam than Aardvarks?
Analysis of traffic logs of email received by a large UK ISP shows considerable disparity between the proportions of spam received by addresses with different first characters. Th...
Richard Clayton
CEAS
2008
Springer
13 years 9 months ago
Social Honeypots: Making Friends With A Spammer Near You
Social networking communities have become an important communications platform, but the popularity of these communities has also made them targets for a new breed of social spamme...
Steve Webb, James Caverlee, Calton Pu
CEAS
2008
Springer
13 years 9 months ago
Activity-centred Search in Email
We consider activity-centered tasks in email, including the novel task of predicting future involvement of persons from an enterprise in an ongoing activity represented by a folde...
Einat Minkov, Ramnath Balasubramanyan, William W. ...
CEAS
2008
Springer
13 years 9 months ago
Breaking out of the Browser to Defend Against Phishing Attacks
Current approaches to phishing prevention are focused on the web browser and the user's interaction with it. We present a new approach to allowing users to interact reliably ...
Diana K. Smetters, Paul Stewart
CEAS
2008
Springer
13 years 9 months ago
Improving Image Spam Filtering Using Image Text Features
In this paper we consider the approach to image spam filtering based on using image classifiers aimed at discriminating between ham and spam images, previously proposed by other a...
Giorgio Fumera, Fabio Roli, Battista Biggio, Ignaz...
CEAS
2008
Springer
13 years 9 months ago
Empirical research on IP blacklisting
This paper describes two innovative analysis methods for IPv4 address sets such as antispam blacklists. First, the contents analysis provides means of measuring key properties of ...
Christian Dietrich, Christian Rossow
CEAS
2008
Springer
13 years 9 months ago
A Survey of Modern Spam Tools
Over the past 5 years, spam sending technology has improved dramatically. Static messages sent opportunistically through misconfigured hosts have evolved into dynamically generate...
Henry Stern
CEAS
2008
Springer
13 years 9 months ago
Detecting Known and New Salting Tricks in Unwanted Emails
Spam and phishing emails are not only annoying to users, but are a real threat to internet communication and web economy. The fight against unwanted emails has become a cat-and-mo...
André Bergholz, Gerhard Paass, Frank Reicha...
CEAS
2008
Springer
13 years 9 months ago
Tracking Email Reputation for Authenticated Sender Identities
With the amount of unsolicited emails on the rise, domain authentication schemes have been widely deployed to identify senders. Establishing a sender's identity does not guar...
Gautam Singaraju, Jeffrey Moss, Brent ByungHoon Ka...