Sciweavers

CEAS
2005
Springer
13 years 6 months ago
Computers beat Humans at Single Character Recognition in Reading based Human Interaction Proofs (HIPs)
Human interaction proofs (HIPs) have become commonplace on the internet for protecting free online services from abuse by automated scripts/bots. They are challenges designed to b...
Kumar Chellapilla, Kevin Larson, Patrice Y. Simard...
CEAS
2005
Springer
13 years 9 months ago
Throttling Outgoing SPAM for Webmail Services
Spam has become a serious problem of Internet, and the current defense is limited to the filters deployed at the recipient side. Little known research has been applied to reduce ...
Zhenyu Zhong, Kun Huang, Kang Li
CEAS
2005
Springer
13 years 9 months ago
Automatic Discovery of Personal Topics to Organize Email
We present in this paper a procedure to automatically discover a user s personal topics by clustering their emails. Unlike previous work, we automatically label topics using appro...
Arun C. Surendran, John C. Platt, Erin Renshaw
CEAS
2005
Springer
13 years 9 months ago
Forward Thinking
Marc A. Smith, Jeff Ubois, Benjamin M. Gross
CEAS
2005
Springer
13 years 9 months ago
The Social Network and Relationship Finder: Social Sorting for Email Triage
Email triage is the process of going through unhandled email and deciding what to do with it. This process can quickly become a serious problem for users with large volumes of ema...
Carman Neustaedter, A. J. Bernheim Brush, Marc A. ...
CEAS
2005
Springer
13 years 9 months ago
Combating Spam through Legislation: A Comparative Analysis of US and European Approaches
Unsolicited Commercial Communication also known as spam - has traditionally been the most visible e-mail threat and has reached a point where it creates a major problem for the de...
Evangelos Moustakas, C. Ranganathan, Penny Duqueno...
CEAS
2005
Springer
13 years 9 months ago
Good Word Attacks on Statistical Spam Filters
Unsolicited commercial email is a significant problem for users and providers of email services. While statistical spam filters have proven useful, senders of spam are learning ...
Daniel Lowd, Christopher Meek
CEAS
2005
Springer
13 years 9 months ago
Experiences with Greylisting
Greylisting temporarily rejects mail from unknown sources on the theory that real mailers will retry while spamware won’t. I outline a taxonomy of greylisters and report some st...
John R. Levine
CEAS
2005
Springer
13 years 9 months ago
SMTP Path Analysis
Most proponents of domain authentication suggest combining domain authentication with reputation services. This paper presents a new learning algorithm for learning the reputation...
Barry Leiba, Joel Ossher, V. T. Rajan, Richard Seg...
CEAS
2005
Springer
13 years 9 months ago
Spam Deobfuscation using a Hidden Markov Model
To circumvent spam filters, many spammers attempt to obfuscate their emails by deliberately misspelling words or introducing other errors into the text. For example viagra may be...
Honglak Lee, Andrew Y. Ng