• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 994
Next 10 →

Spam Filtering

by Rajesh M. Pampapathi, Boris Mirkin, Mark Levene , 2008
"... We present an approach to textual classification based on the suffix tree data structure and apply it to spam filtering. A method for scoring of documents using the suffix tree is developed and a number of scoring and score normalisation functions are tested. Our results show that the character leve ..."
Abstract - Add to MetaCart
We present an approach to textual classification based on the suffix tree data structure and apply it to spam filtering. A method for scoring of documents using the suffix tree is developed and a number of scoring and score normalisation functions are tested. Our results show that the character

Spam Filter Analysis

by Flavio D. Garcia, Jaap-henk Hoepman, Jeroen van Nieuwenhuizen - in ‘Proceedings of 19th IFIP International Information Security Conference, WCC2004-SEC , 2004
"... Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, have been proposed. In this paper we investigate the effectiveness of several spam filtering techniques and technologies. O ..."
Abstract - Cited by 10 (0 self) - Add to MetaCart
Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, have been proposed. In this paper we investigate the effectiveness of several spam filtering techniques and technologies

Evaluation of Bayesian Spam Filter and SVM Spam Filter

by Ayahiko Niimi, Hirofumi Inomata, Masaki Miyamoto, Osamu Konishi
"... Abstract — In this paper, the system that classified spam mail and other mail(regular mail) was constructed by two filters with Bayesian theory and SVM(Support Vector Machine) used well by the text classification task as a text classification algorithm. It was confirmed to evaluate the performance o ..."
Abstract - Add to MetaCart
Abstract — In this paper, the system that classified spam mail and other mail(regular mail) was constructed by two filters with Bayesian theory and SVM(Support Vector Machine) used well by the text classification task as a text classification algorithm. It was confirmed to evaluate the performance

On Attacking Statistical Spam Filters

by Gregory L. Wittel, S. Felix Wu - IN PROCEEDINGS OF THE CONFERENCE ON E-MAIL AND ANTI-SPAM (CEAS) , 2004
"... The efforts of anti-spammers and spammers has often been described as an arms race. As we devise new ways to stem the flood of bulk mail, spammers respond by working their way around the new mechanisms. Their attempts to bypass spam filters illustrates this struggle. Spammers have tried many thin ..."
Abstract - Cited by 64 (0 self) - Add to MetaCart
The efforts of anti-spammers and spammers has often been described as an arms race. As we devise new ways to stem the flood of bulk mail, spammers respond by working their way around the new mechanisms. Their attempts to bypass spam filters illustrates this struggle. Spammers have tried many

Privacy-Preserving Spam Filtering

by Manas A. Pathak, Mehrbod Sharifi, Bhiksha Raj
"... Email is a private medium of communication, and the in-herent privacy constraints form a major obstacle in devel-oping effective spam filtering methods which require access to a large amount of email data belonging to multiple users. To mitigate this problem, we envision a privacy preserv-ing spam f ..."
Abstract - Add to MetaCart
Email is a private medium of communication, and the in-herent privacy constraints form a major obstacle in devel-oping effective spam filtering methods which require access to a large amount of email data belonging to multiple users. To mitigate this problem, we envision a privacy preserv-ing spam

An Incremental Spam Filter

by Munde Kusum M
"... Abstract- Nowadays, email plays a significant role in communication and it is being preferred by everyone. As the spam problem grew larger, the interest in spam filters grew accordingly. Different techniques are present to deal with spam filtering. In this paper, a new algorithm based on incremental ..."
Abstract - Add to MetaCart
Abstract- Nowadays, email plays a significant role in communication and it is being preferred by everyone. As the spam problem grew larger, the interest in spam filters grew accordingly. Different techniques are present to deal with spam filtering. In this paper, a new algorithm based

“In vivo ” spam filtering

by unknown authors
"... A challenge problem for KDD Spam, also known as Unsolicited Commercial Email (UCE), is the bane of email communication. Many data mining researchers have addressed the problem of detecting spam, generally by treating it as a static text classification problem. True in vivo spam filtering has charact ..."
Abstract - Add to MetaCart
A challenge problem for KDD Spam, also known as Unsolicited Commercial Email (UCE), is the bane of email communication. Many data mining researchers have addressed the problem of detecting spam, generally by treating it as a static text classification problem. True in vivo spam filtering has

Spam Filtering by Quantitative Profiles

by Marian Grendár
"... Instead of the “bag-of-words ” representation, in the quantitative profile approach to spam filtering and email categorization, an email is represented by an m-dimensional vector of numbers, with m fixed in advance. Inspired by email shape analysis proposed recently by Sroufe et al., two instances o ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Instead of the “bag-of-words ” representation, in the quantitative profile approach to spam filtering and email categorization, an email is represented by an m-dimensional vector of numbers, with m fixed in advance. Inspired by email shape analysis proposed recently by Sroufe et al., two instances

Layout based spam filtering

by Claudiu N. Musat - Transactions on Engineering, Computing and Technology , 2006
"... Abstract—Due to the constant increase in the volume of information available to applications in fields varying from medical diagnosis to web search engines, accurate support of similarity becomes an important task. This is also the case of spam filtering techniques where the similarities between the ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract—Due to the constant increase in the volume of information available to applications in fields varying from medical diagnosis to web search engines, accurate support of similarity becomes an important task. This is also the case of spam filtering techniques where the similarities between

Spam filtering by quantitative profiles

by unknown authors
"... Instead of the “bag-of-words ” representation, in the quantitative profile approach to spam filtering and email categorization, an email is represented by an m-dimensional vector of numbers, with m fixed in advance. Inspired by Sroufe et al. [Sroufe, P., Phithakkitnukoon, S., Dantu, R., and Cangussu ..."
Abstract - Add to MetaCart
Instead of the “bag-of-words ” representation, in the quantitative profile approach to spam filtering and email categorization, an email is represented by an m-dimensional vector of numbers, with m fixed in advance. Inspired by Sroufe et al. [Sroufe, P., Phithakkitnukoon, S., Dantu, R
Next 10 →
Results 1 - 10 of 994
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University