168
click to vote
CEAS
15 years 10 months ago
2004 Springer
We present an end-to-end system that extracts a user’s social network and its members’ contact information given the user’s email inbox. The system identifies unique people...
143
click to vote
CEAS
15 years 10 months ago
2004 Springer
In addition to traditional spam detection applications, new methods of filtering messages – including whitelist and social network based filters – are being investigated to fur...
142
click to vote
CEAS
15 years 10 months ago
2004 Springer
: We describe methods for automatically identifying signature blocks and reply lines in plaintext email messages. This analysis has many potential applications, such as preprocessi...
137
click to vote
CEAS
15 years 10 months ago
2004 Springer
Generally a content based spam filter works on words and phrases of email text and if it finds offensive content it gives that email a numerical value (depending on the content). A...
134
click to vote
CEAS
15 years 10 months ago
2004 Springer
IP addresses are an important tool for fighting spam, used for safe lists, blackhole lists, anti-spoofing and related purposes. While it is trivial to find the sender’s IP add...
|