CEAS
15 years 3 months ago
2004 Springer
We present an end-to-end system that extracts a user’s social network and its members’ contact information given the user’s email inbox. The system identifies unique people...
CEAS
15 years 3 months ago
2004 Springer
In addition to traditional spam detection applications, new methods of filtering messages – including whitelist and social network based filters – are being investigated to fur...
CEAS
15 years 3 months ago
2004 Springer
IP addresses are an important tool for fighting spam, used for safe lists, blackhole lists, anti-spoofing and related purposes. While it is trivial to find the sender’s IP add...
CEAS
15 years 3 months ago
2004 Springer
One source major of email addresses for spammers involves “harvesting” them from websites. This paper describes a proposal to allow a website owner to make illegal such automat...
CEAS
15 years 3 months ago
2004 Springer
: We describe methods for automatically identifying signature blocks and reply lines in plaintext email messages. This analysis has many potential applications, such as preprocessi...
|