Results 1 - 10
of
994
Spam Filtering
, 2008
"... We present an approach to textual classification based on the suffix tree data structure and apply it to spam filtering. A method for scoring of documents using the suffix tree is developed and a number of scoring and score normalisation functions are tested. Our results show that the character leve ..."
Abstract
- Add to MetaCart
We present an approach to textual classification based on the suffix tree data structure and apply it to spam filtering. A method for scoring of documents using the suffix tree is developed and a number of scoring and score normalisation functions are tested. Our results show that the character
Spam Filter Analysis
- in ‘Proceedings of 19th IFIP International Information Security Conference, WCC2004-SEC
, 2004
"... Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, have been proposed. In this paper we investigate the effectiveness of several spam filtering techniques and technologies. O ..."
Abstract
-
Cited by 10 (0 self)
- Add to MetaCart
Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, have been proposed. In this paper we investigate the effectiveness of several spam filtering techniques and technologies
Evaluation of Bayesian Spam Filter and SVM Spam Filter
"... Abstract — In this paper, the system that classified spam mail and other mail(regular mail) was constructed by two filters with Bayesian theory and SVM(Support Vector Machine) used well by the text classification task as a text classification algorithm. It was confirmed to evaluate the performance o ..."
Abstract
- Add to MetaCart
Abstract — In this paper, the system that classified spam mail and other mail(regular mail) was constructed by two filters with Bayesian theory and SVM(Support Vector Machine) used well by the text classification task as a text classification algorithm. It was confirmed to evaluate the performance
On Attacking Statistical Spam Filters
- IN PROCEEDINGS OF THE CONFERENCE ON E-MAIL AND ANTI-SPAM (CEAS)
, 2004
"... The efforts of anti-spammers and spammers has often been described as an arms race. As we devise new ways to stem the flood of bulk mail, spammers respond by working their way around the new mechanisms. Their attempts to bypass spam filters illustrates this struggle. Spammers have tried many thin ..."
Abstract
-
Cited by 64 (0 self)
- Add to MetaCart
The efforts of anti-spammers and spammers has often been described as an arms race. As we devise new ways to stem the flood of bulk mail, spammers respond by working their way around the new mechanisms. Their attempts to bypass spam filters illustrates this struggle. Spammers have tried many
Privacy-Preserving Spam Filtering
"... Email is a private medium of communication, and the in-herent privacy constraints form a major obstacle in devel-oping effective spam filtering methods which require access to a large amount of email data belonging to multiple users. To mitigate this problem, we envision a privacy preserv-ing spam f ..."
Abstract
- Add to MetaCart
Email is a private medium of communication, and the in-herent privacy constraints form a major obstacle in devel-oping effective spam filtering methods which require access to a large amount of email data belonging to multiple users. To mitigate this problem, we envision a privacy preserv-ing spam
An Incremental Spam Filter
"... Abstract- Nowadays, email plays a significant role in communication and it is being preferred by everyone. As the spam problem grew larger, the interest in spam filters grew accordingly. Different techniques are present to deal with spam filtering. In this paper, a new algorithm based on incremental ..."
Abstract
- Add to MetaCart
Abstract- Nowadays, email plays a significant role in communication and it is being preferred by everyone. As the spam problem grew larger, the interest in spam filters grew accordingly. Different techniques are present to deal with spam filtering. In this paper, a new algorithm based
“In vivo ” spam filtering
"... A challenge problem for KDD Spam, also known as Unsolicited Commercial Email (UCE), is the bane of email communication. Many data mining researchers have addressed the problem of detecting spam, generally by treating it as a static text classification problem. True in vivo spam filtering has charact ..."
Abstract
- Add to MetaCart
A challenge problem for KDD Spam, also known as Unsolicited Commercial Email (UCE), is the bane of email communication. Many data mining researchers have addressed the problem of detecting spam, generally by treating it as a static text classification problem. True in vivo spam filtering has
Spam Filtering by Quantitative Profiles
"... Instead of the “bag-of-words ” representation, in the quantitative profile approach to spam filtering and email categorization, an email is represented by an m-dimensional vector of numbers, with m fixed in advance. Inspired by email shape analysis proposed recently by Sroufe et al., two instances o ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Instead of the “bag-of-words ” representation, in the quantitative profile approach to spam filtering and email categorization, an email is represented by an m-dimensional vector of numbers, with m fixed in advance. Inspired by email shape analysis proposed recently by Sroufe et al., two instances
Layout based spam filtering
- Transactions on Engineering, Computing and Technology
, 2006
"... Abstract—Due to the constant increase in the volume of information available to applications in fields varying from medical diagnosis to web search engines, accurate support of similarity becomes an important task. This is also the case of spam filtering techniques where the similarities between the ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract—Due to the constant increase in the volume of information available to applications in fields varying from medical diagnosis to web search engines, accurate support of similarity becomes an important task. This is also the case of spam filtering techniques where the similarities between
Spam filtering by quantitative profiles
"... Instead of the “bag-of-words ” representation, in the quantitative profile approach to spam filtering and email categorization, an email is represented by an m-dimensional vector of numbers, with m fixed in advance. Inspired by Sroufe et al. [Sroufe, P., Phithakkitnukoon, S., Dantu, R., and Cangussu ..."
Abstract
- Add to MetaCart
Instead of the “bag-of-words ” representation, in the quantitative profile approach to spam filtering and email categorization, an email is represented by an m-dimensional vector of numbers, with m fixed in advance. Inspired by Sroufe et al. [Sroufe, P., Phithakkitnukoon, S., Dantu, R
Results 1 - 10
of
994