Sciweavers

CEAS
2005
Springer
13 years 10 months ago
Searching For John Doe: Finding Spammers and Phishers
Microsoft has prosecuted a vigorous civil enforcement campaign against spammers and phishers. When initial investigation into a spam or phishing case fails to reveal the identity ...
Aaron E. Kornblum
CEAS
2005
Springer
13 years 10 months ago
Email Task Management: An Iterative Relational Learning Approach
Today’s email clients were designed for yesterday’s email. Originally, email was merely a communication medium. Today, people engage in a variety of complex behaviours using e...
Rinat Khoussainov, Nicholas Kushmerick
CEAS
2005
Springer
13 years 10 months ago
Naive Bayes Spam Filtering Using Word-Position-Based Attributes
This paper explores the use of the naive Bayes classifier as the basis for personalised spam filters. Several machine learning algorithms, including variants of naive Bayes, hav...
Johan Hovold
CEAS
2005
Springer
13 years 10 months ago
Accredited DomainKeys: A Service Architecture for Improved Email Validation
We present an architecture called Accredited DomainKeys, which builds on the DomainKeys email authentication infrastructure to address the following questions: • “Did the send...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
CEAS
2005
Springer
13 years 10 months ago
Implicit Queries for Email
Implicit query systems examine a document and automatically conduct searches for the most relevant information. In this paper, we offer three contributions to implicit query resea...
Joshua Goodman, Vitor R. Carvalho
CEAS
2005
Springer
13 years 10 months ago
Comparative Graph Theoretical Characterization of Networks of Spam
Email is an increasingly important and ubiquitous means of communication, both facilitating contact between individuals and enabling rises in the productivity of organizations. Ho...
Luíz Henrique Gomes, Rodrigo B. Almeida, Lu...
CEAS
2005
Springer
13 years 10 months ago
Reply Expectation Prediction for Email Management
We reduce email overload by addressing the problem of waiting for a reply to one’s email. We predict whether sent and received emails necessitate a reply, enabling the user to b...
Mark Dredze, John Blitzer, Fernando Pereira
CEAS
2005
Springer
13 years 10 months ago
Spam Corpus Creation for TREC
Gordon V. Cormack, Thomas R. Lynam
CEAS
2005
Springer
13 years 10 months ago
Stopping Outgoing Spam by Examining Incoming Server Logs
Processing server logs for the email arriving at an ISP can be used to detect remote sites where machines are infected by email viruses or have been hijacked and used for sending ...
Richard Clayton