Sciweavers

18 search results - page 3 / 4
» New filtering approaches for phishing email
Sort
View
CCS
2007
ACM
13 years 10 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
CACM
2006
102views more  CACM 2006»
13 years 6 months ago
Infoglut
whose titles and abstracts sound very interesting, the pile of unread reports continues to grow on the table in my office." (How quaint the terminology: mail and electronic me...
Peter J. Denning
CCS
2010
ACM
13 years 6 months ago
@spam: the underground on 140 characters or less
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blackl...
Chris Grier, Kurt Thomas, Vern Paxson, Michael Zha...
WEBI
2004
Springer
13 years 11 months ago
Co-training with a Single Natural Feature Set Applied to Email Classification
When dealing with information overload from the Internet, such as the classification of Web pages and the filtering of email spam, a new technique called cotraining has been shown...
Jason Chan, Irena Koprinska, Josiah Poon
CEAS
2005
Springer
13 years 11 months ago
Spamato - An Extendable Spam Filter System
Spam filter developers are confronted with the task of integrating their ideas in user-friendly products. In this paper, we introduce Spamato as an open, extendable, and multi-fa...
Keno Albrecht, Nicolas Burri, Roger Wattenhofer