Blogs are becoming an increasingly popular target for spammers. The existence of multiple vectors for spam injection, the potential of reaching many eyeballs with a single spam, a...
Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approache...
The current mail server architecture spawns a new process upon every new connection it receives. The new process deals with the handling of the mail from accepting “Helo” info...
Web spam research has been hampered by a lack of statistically significant collections. In this paper, we perform the first large-scale characterization of web spam using conten...
The growing popularity of IP telephony systems has made them attractive targets for spammers. Voice call spam, also known as Spam over Internet Telephony (SPIT), is potentially a ...