Sciweavers

CEAS
2004
Springer
13 years 10 months ago
The Impact of Feature Selection on Signature-Driven Spam Detection
Signature-driven spam detection provides an alternative to machine learning approaches and can be very effective when near-duplicates of essentially the same message are sent in h...
Aleksander Kolcz, Abdur Chowdhury, Joshua Alspecto...
CEAS
2004
Springer
13 years 10 months ago
Introducing the Enron Corpus
Bryan Klimt, Yiming Yang
CEAS
2004
Springer
13 years 10 months ago
Trends in Spam Products and Methods
Geoff Hulten, Anthony Penta, Gopalakrishnan Seshad...
CEAS
2004
Springer
13 years 10 months ago
Inferring Ongoing Activities of Workstation Users by Clustering Email
Yifen Huang, Dinesh Govindaraju, Tom M. Mitchell, ...
CEAS
2004
Springer
13 years 10 months ago
Personalised, Collaborative Spam Filtering
The state of the art sees content-based filters tending towards collaborative filters, whereby email is filtered at the MTA with users feeding information back about false posit...
Alan Gray, Mads Haahr
CEAS
2004
Springer
13 years 10 months ago
IP Addresses in Email Clients
IP addresses are an important tool for fighting spam, used for safe lists, blackhole lists, anti-spoofing and related purposes. While it is trivial to find the sender’s IP add...
Joshua Goodman
CEAS
2004
Springer
13 years 10 months ago
Reputation Network Analysis for Email Filtering
In addition to traditional spam detection applications, new methods of filtering messages – including whitelist and social network based filters – are being investigated to fur...
Jennifer Golbeck, James A. Hendler
CEAS
2004
Springer
13 years 10 months ago
Anatomy of a Phishing Email
Christine E. Drake, Jonathan J. Oliver, Eugene J. ...
CEAS
2004
Springer
13 years 10 months ago
Shall We Stop All Unsolicited Email Messages?
Spam is commonly defined as unsolicited email messages, and the goal of spam filtering is to eliminate these messages. In this paper, we argue that not all unsolicited email messag...
Rui Dai, Kang Li