Term-weighting approaches in automatic text retrieval
Information Processing and Management: an International Journal
The anatomy of a large-scale hypertextual Web search engine
WWW7 Proceedings of the seventh international conference on World Wide Web 7
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Machine learning in automated text categorization
ACM Computing Surveys (CSUR)
Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond
Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond
A Comparative Study on Feature Selection in Text Categorization
ICML '97 Proceedings of the Fourteenth International Conference on Machine Learning
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
P2P '01 Proceedings of the First International Conference on Peer-to-Peer Computing
Telling humans and computers apart automatically
Communications of the ACM - Information cities
Fighting the spam wars: A remailer approach with restrictive aliasing
ACM Transactions on Internet Technology (TOIT)
Collision Module Integration in a Specific Graphic Engine for Terrain Visualization
IV '04 Proceedings of the Information Visualisation, Eighth International Conference
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
An empirical study of spam traffic and the use of DNS black lists
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
An evaluation of statistical spam filtering techniques
ACM Transactions on Asian Language Information Processing (TALIP)
Combining email models for false positive reduction
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
MailRank: using ranking for spam detection
Proceedings of the 14th ACM international conference on Information and knowledge management
The grid core technologies
SpamCooker: A Method for Deterring Unsolicited Electronic Communications
ITNG '06 Proceedings of the Third International Conference on Information Technology: New Generations
Can machine learning be secure?
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
"May I borrow Your Filter?" Exchanging Filters to Combat Spam in a Community
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
Fast statistical spam filter by approximate classifications
SIGMETRICS '06/Performance '06 Proceedings of the joint international conference on Measurement and modeling of computer systems
Peer-to-peer collaborative spam detection
Crossroads
SIGIR '06 Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval
Catching spam before it arrives: domain specific dynamic blacklists
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Experiences with MapReduce, an abstraction for large-scale computation
Proceedings of the 15th international conference on Parallel architectures and compilation techniques
Understanding the network-level behavior of spammers
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
An Approach to Spam Detection by Naive Bayes Ensemble Based on Decision Induction
ISDA '06 Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications - Volume 02
E-mail Authentication: What, Why, How?
Queue - Cybercrime
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition (Morgan Kaufmann Series in Data Management Systems)
Spam and the ongoing battle for the inbox
Communications of the ACM - Spam and the ongoing battle for the inbox
Maximizing classifier utility when training data is costly
ACM SIGKDD Explorations Newsletter
Google news personalization: scalable online collaborative filtering
Proceedings of the 16th international conference on World Wide Web
DMTP: Controlling spam through message delivery differentiation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Online supervised spam filter evaluation
ACM Transactions on Information Systems (TOIS)
Approaches for semantic interoperability between domain ontologies
AOW '06 Proceedings of the second Australasian workshop on Advances in ontologies - Volume 72
Relaxed online SVMs for spam filtering
SIGIR '07 Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval
Users dealing with spam and spam filters: some observations and recommendations
Proceedings of the 8th ACM SIGCHI New Zealand chapter's international conference on Computer-human interaction: design centered HCI
Trinitya: distributed defense against transient spam-bots
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
Raising the baseline for high-precision text classifiers
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Distributed classification in peer-to-peer networks
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Proceedings of the ninth international conference on Electronic commerce
Filtering spam with behavioral blacklisting
Proceedings of the 14th ACM conference on Computer and communications security
MapReduce: simplified data processing on large clusters
Communications of the ACM - 50th anniversary issue: 1958 - 2008
PSSF: A Novel Statistical Approach for Personalized Service-side Spam Filtering
WI '07 Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence
Research of Anti-spam Application Architecture Based on Semantic Grid
ICICIC '07 Proceedings of the Second International Conference on Innovative Computing, Informatio and Control
Adaptive e-mail intention finding mechanism based on e-mail words social networks
Proceedings of the 2007 workshop on Large scale attack defense
Multi-Level Reputation-Based Greylisting
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Peeking into spammer behavior from a unique vantage point
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
Spamming botnets: signatures and characteristics
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Constructing a User Preference Ontology for Anti-spam Mail Systems
CAI '07 Proceedings of the 20th conference of the Canadian Society for Computational Studies of Intelligence on Advances in Artificial Intelligence
Identifying video spammers in online social networks
AIRWeb '08 Proceedings of the 4th international workshop on Adversarial information retrieval on the web
A low-cost attack on a Microsoft captcha
Proceedings of the 15th ACM conference on Computer and communications security
Social networks and context-aware spam
Proceedings of the 2008 ACM conference on Computer supported cooperative work
Improving the Efficiency of Spam Filtering through Cache Architecture
MASCOTS '07 Proceedings of the 2007 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems
Building a Scalable Collaborative Web Filter with Free and Open Source Software
SITIS '08 Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems
Evaluation of spam detection and prevention frameworks for email and image spam: a state of art
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks
Expert Systems with Applications: An International Journal
Approximate object location and spam filtering on peer-to-peer systems
Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware
Clustering malware-generated spam emails with a novel fuzzy string matching algorithm
Proceedings of the 2009 ACM symposium on Applied Computing
Spam decisions on gray e-mail using personalized ontologies
Proceedings of the 2009 ACM symposium on Applied Computing
Improved spam filtering by extraction of information from text embedded image e-mail
Proceedings of the 2009 ACM symposium on Applied Computing
Review: A review of machine learning approaches to Spam filtering
Expert Systems with Applications: An International Journal
Better Naive Bayes classification for high-precision spam detection
Software—Practice & Experience
Spam Filtering Method Based on an Artificial Immune System
MMIT '08 Proceedings of the 2008 International Conference on MultiMedia and Information Technology
A survey of learning-based techniques of email spam filtering
Artificial Intelligence Review
A Novel Method to Detect Junk Mail Traffic
HIS '09 Proceedings of the 2009 Ninth International Conference on Hybrid Intelligent Systems - Volume 03
A Novel Spam Email Detection System Based on Negative Selection
ICCIT '09 Proceedings of the 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology
Language-model-based detection cascade for efficient classification of image-based spam e-mail
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
A multiagent-based peer-to-peer network in Java for distributed spam filtering
CEEMAS'03 Proceedings of the 3rd Central and Eastern European conference on Multi-agent systems
End-to-end header protection in signed S/MIME
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Anti-spam grid: a dynamically organized spam filtering infrastructure
SMO'05 Proceedings of the 5th WSEAS international conference on Simulation, modelling and optimization
Multilateral decisions for collaborative defense against unsolicited bulk e-mail
iTrust'06 Proceedings of the 4th international conference on Trust Management
Hi-index | 0.00 |
From just an annoying characteristic of the electronic mail epoch, spam has evolved into an expensive resource and time-consuming problem. In this survey, we focus on emerging approaches to spam filtering built on recent developments in computing technologies. These include peer-to-peer computing, grid computing, semantic Web, and social networks. We also address a number of perspectives related to personalization and privacy in spam filtering. We conclude that, while important advancements have been made in spam filtering in recent years, high performance approaches remain to be explored due to the large scale of the problem.