Sciweavers

CEAS
2011
Springer
12 years 5 months ago
Spam detection using web page content: a new battleground
Traditional content-based e-mail spam filtering takes into account content of e-mail messages and apply machine learning techniques to infer patterns that discriminate spams from...
Marco Túlio Ribeiro, Pedro Henrique Calais ...
BIOSYSTEMS
2008
100views more  BIOSYSTEMS 2008»
13 years 5 months ago
Identification of SPAM messages using an approach inspired on the immune system
In this paper, an immune-inspired model, named IA-AIS (Innate and Adaptive Artificial Immune System) is proposed and applied to the problem of identification of unsolicited bulk e...
Thiago S. Guzella, Tomaz A. Mota-Santos, Joaquim Q...
USENIX
2003
13 years 6 months ago
ASK: Active Spam Killer
We present Active Spam Killer (ASK), a program that attempts to validate unknown senders before allowing delivery of their message. Validation occurs by means of a challenge reply...
Marco Paganini
CEAS
2008
Springer
13 years 7 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
CEAS
2006
Springer
13 years 8 months ago
The Effects of Anti-Spam Methods on Spam Mail
We provide a model to study the effects of three methods of fighting spam mail, namely (1) increasing the cost of mailing messages, (2) filters, and (3) a do-not-spam registry, on...
Eilon Solan, Eran Reshef
CEAS
2005
Springer
13 years 10 months ago
Throttling Outgoing SPAM for Webmail Services
Spam has become a serious problem of Internet, and the current defense is limited to the filters deployed at the recipient side. Little known research has been applied to reduce ...
Zhenyu Zhong, Kun Huang, Kang Li
ICC
2007
IEEE
119views Communications» more  ICC 2007»
13 years 11 months ago
Behavioral Characteristics of Spammers and Their Network Reachability Properties
By analyzing a two-month trace of more than 25 million emails received at a large US university campus network, of which more than 18 million are spam messages, we characterize th...
Zhenhai Duan, Kartik Gopalan, Xin Yuan