Sciweavers

Share
CEAS
2008
Springer
9 years 9 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao
CEAS
2008
Springer
9 years 9 months ago
Improved Phishing Detection using Model-Based Features
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
André Bergholz, Jeong Ho Chang, Gerhard Paa...
CEAS
2008
Springer
9 years 9 months ago
Personalized Spam Filtering for Gray Mail
Gray mail, messages that could reasonably be considered either spam or good by different email users, is a commonly observed issue in production spam filtering systems. In this pa...
Ming-Wei Chang, Scott Yih, Robert McCann
CEAS
2008
Springer
9 years 9 months ago
Filtering Email Spam in the Presence of Noisy User Feedback
Recent email spam filtering evaluations, such as those conducted at TREC, have shown that near-perfect filtering results are attained with a variety of machine learning methods wh...
D. Sculley, Gordon V. Cormack
CEAS
2008
Springer
9 years 9 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
CEAS
2008
Springer
9 years 9 months ago
Reducing E-Discovery Cost by Filtering Included Emails
As businesses become more reliance on information technology, electronic information is often produced as vital evidence during civil litigation. The process of discovering electr...
Tsuen-Wan Ngan
CEAS
2008
Springer
9 years 9 months ago
On Free Speech and Civil Discourse: Filtering Abuse in Blog Comments
Internet blogs provide forums for discussions within virtual communities, allowing readers to post comments on what they read. However, such comments may contain abuse, such as pe...
D. Sculley
CEAS
2008
Springer
9 years 9 months ago
The Effectiveness of Whitelisting: a User-Study
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
David Erickson, Martin Casado, Nick McKeown
CEAS
2008
Springer
9 years 9 months ago
Exploiting Transport-Level Characteristics of Spam
We present a novel spam detection technique that relies on neither content nor reputation analysis. This work investigates the discriminatory power of email transport-layer charac...
Robert Beverly, Karen R. Sollins
CEAS
2008
Springer
9 years 9 months ago
Analysis of Spectral Parameters of Audio Signals for the Identification of Spam Over IP Telephony
A method is presented which analyses the audio speech data of voice calls and calculates an "acoustic fingerprint". The audio data of the voice calls are compared with e...
Christoph Pörschmann, Heiko Knospe
books