Sciweavers

CEAS
2006
Springer
13 years 8 months ago
Spamalot: A Toolkit for Consuming Spammers' Resources
Peter Nelson, Kenneth Dallmeyer, Lucasz Szybalski,...
CEAS
2006
Springer
13 years 8 months ago
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...
CEAS
2006
Springer
13 years 8 months ago
Teaching Spam and Spyware at the University of C@1g4ry
The University of Calgary is attacking the problems of spam and spyware from the angle of education. "Spam and Spyware" is a computer science course offered at both the ...
John Aycock
CEAS
2006
Springer
13 years 8 months ago
CC Prediction with Graphical Models
We address the problem of suggesting who to add as an additional recipient (i.e. cc, or carbon copy) for an email under composition. We address the problem using graphical models ...
Chris Pal
CEAS
2006
Springer
13 years 8 months ago
An Email and Meeting Assistant Using Graph Walks
We describe a framework for representing email as well as meeting information as a joint graph. In the graph, documents and meeting descriptions are connected via other nontextual...
Einat Minkov, William W. Cohen
CEAS
2006
Springer
13 years 8 months ago
Using Early Results from the 'spamHINTS' Project to Estimate an ISP Abuse Team's Task
ISPs operate "abuse" teams to deal with reports of inappropriate email being sent by their customers. Currently, the majority of this work is dealing with insecure syste...
Richard Clayton
CEAS
2006
Springer
13 years 8 months ago
Sender Reputation in a Large Webmail Service
In this paper, we describe how a large webmail service uses reputation to classify authenticated sending domains as either spammy or not spammy. Both SPF and DomainKey authenticat...
Bradley Taylor
CEAS
2006
Springer
13 years 8 months ago
Batch and Online Spam Filter Comparison
Gordon V. Cormack, Andrej Bratko
CEAS
2006
Springer
13 years 8 months ago
"Sorry, I Forgot the Attachment": Email Attachment Prediction
The missing attachment problem: a missing attachment generates a wave of emails from the recipients notifying the sender of the error. We present an attachment prediction system t...
Mark Dredze, John Blitzer, Fernando Pereira