115
click to vote
CEAS
15 years 5 months ago
2004 Springer
We present an end-to-end system that extracts a user’s social network and its members’ contact information given the user’s email inbox. The system identifies unique people...
104
click to vote
CEAS
15 years 5 months ago
2004 Springer
In addition to traditional spam detection applications, new methods of filtering messages – including whitelist and social network based filters – are being investigated to fur...
103
click to vote
CEAS
15 years 5 months ago
2004 Springer
IP addresses are an important tool for fighting spam, used for safe lists, blackhole lists, anti-spoofing and related purposes. While it is trivial to find the sender’s IP add...
CEAS
15 years 5 months ago
2004 Springer
Generally a content based spam filter works on words and phrases of email text and if it finds offensive content it gives that email a numerical value (depending on the content). A...
CEAS
15 years 5 months ago
2004 Springer
One source major of email addresses for spammers involves “harvesting” them from websites. This paper describes a proposal to allow a website owner to make illegal such automat...
|