Sciweavers

26 search results - page 3 / 6
» ceas 2007
Sort
View
CEAS
2007
Springer
13 years 9 months ago
Blog Spam: A Review
Blogs are becoming an increasingly popular target for spammers. The existence of multiple vectors for spam injection, the potential of reaching many eyeballs with a single spam, a...
Adam Thomason
CEAS
2007
Springer
13 years 11 months ago
Hardening Fingerprinting by Context
Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approache...
Aleksander Kolcz, Abdur Chowdhury
CEAS
2007
Springer
13 years 11 months ago
A Case for a Spam-Aware Mail Server Architecture
The current mail server architecture spawns a new process upon every new connection it receives. The new process deals with the handling of the mail from accepting “Helo” info...
Abhinav Pathak, Sabyasachi Roy, Y. Charlie Hu
CEAS
2007
Springer
13 years 11 months ago
Characterizing Web Spam Using Content and HTTP Session Analysis
Web spam research has been hampered by a lack of statistically significant collections. In this paper, we perform the first large-scale characterization of web spam using conten...
Steve Webb, James Caverlee, Calton Pu
CEAS
2007
Springer
13 years 11 months ago
CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation
The growing popularity of IP telephony systems has made them attractive targets for spammers. Voice call spam, also known as Spam over Internet Telephony (SPIT), is potentially a ...
Vijay Balasubramaniyan, Mustaque Ahamad, Haesun Pa...