CEAS
15 years 2 months ago
2004 Springer
We present an end-to-end system that extracts a user’s social network and its members’ contact information given the user’s email inbox. The system identifies unique people...
CEAS
15 years 2 months ago
2004 Springer
In addition to traditional spam detection applications, new methods of filtering messages – including whitelist and social network based filters – are being investigated to fur...
CEAS
15 years 2 months ago
2004 Springer
IP addresses are an important tool for fighting spam, used for safe lists, blackhole lists, anti-spoofing and related purposes. While it is trivial to find the sender’s IP add...
CEAS
15 years 2 months ago
2004 Springer
One source major of email addresses for spammers involves “harvesting” them from websites. This paper describes a proposal to allow a website owner to make illegal such automat...
CEAS
15 years 19 days ago
2004 Springer
The day to day rhetoric associated with spam control focuses on measures, technology, rules or fees to impose order or control. These efforts concentrate on the broad range of mess...
|