Sciweavers

CEAS
2004
Springer
13 years 10 months ago
Extracting social networks and contact information from email and the Web
We present an end-to-end system that extracts a user’s social network and its members’ contact information given the user’s email inbox. The system identifies unique people...
Aron Culotta, Ron Bekkerman, Andrew McCallum
CEAS
2004
Springer
13 years 10 months ago
Reputation Network Analysis for Email Filtering
In addition to traditional spam detection applications, new methods of filtering messages – including whitelist and social network based filters – are being investigated to fur...
Jennifer Golbeck, James A. Hendler
CEAS
2004
Springer
13 years 10 months ago
IP Addresses in Email Clients
IP addresses are an important tool for fighting spam, used for safe lists, blackhole lists, anti-spoofing and related purposes. While it is trivial to find the sender’s IP add...
Joshua Goodman
CEAS
2004
Springer
13 years 10 months ago
The Impact of Feature Selection on Signature-Driven Spam Detection
Signature-driven spam detection provides an alternative to machine learning approaches and can be very effective when near-duplicates of essentially the same message are sent in h...
Aleksander Kolcz, Abdur Chowdhury, Joshua Alspecto...
CEAS
2004
Springer
13 years 10 months ago
Word Stemming to Enhance Spam Filtering
Generally a content based spam filter works on words and phrases of email text and if it finds offensive content it gives that email a numerical value (depending on the content). A...
Shabbir Ahmed, Farzana Mithun
Internet Technology
Top of PageReset Settings