Communications of the ACM
ACM president's letter: electronic junk
Communications of the ACM
Pricing via Processing or Combatting Junk Mail
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Curbing Junk E-Mail via Secure Classification
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Consistent, yet anonymous, Web access with LPWA
Communications of the ACM
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
SIGIR '00 Proceedings of the 23rd annual international ACM SIGIR conference on Research and development in information retrieval
Information retrieval on the web
ACM Computing Surveys (CSUR)
Targeting audiences on the internet
Communications of the ACM
Admediation: New Horizons in Effective Email Advertising
Communications of the ACM
Evaluating cost-sensitive Unsolicited Bulk Email categorization
Proceedings of the 2002 ACM symposium on Applied computing
Markets for attention: will postage for email help?
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Information Filtering: Overview of Issues, Research and Systems
User Modeling and User-Adapted Interaction
Input and Output Feature Selection
ICANN '02 Proceedings of the International Conference on Artificial Neural Networks
Fighting the spam wars: A remailer approach with restrictive aliasing
ACM Transactions on Internet Technology (TOIT)
"In vivo" spam filtering: a challenge problem for KDD
ACM SIGKDD Explorations Newsletter
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Moderately hard, memory-bound functions
ACM Transactions on Internet Technology (TOIT)
SELS: a secure e-mail list service
Proceedings of the 2005 ACM symposium on Applied computing
Quality improvement of email communication in work groups and organizations by reflection
GROUP '05 Proceedings of the 2005 international ACM SIGGROUP conference on Supporting group work
Exploiting open functionality in SMS-capable cellular networks
Proceedings of the 12th ACM conference on Computer and communications security
Combining text and heuristics for cost-sensitive spam filtering
ConLL '00 Proceedings of the 2nd workshop on Learning language in logic and the 4th conference on Computational natural language learning - Volume 7
Email alias detection using social network analysis
Proceedings of the 3rd international workshop on Link discovery
SF-HME system: a hierarchical mixtures-of-experts classification system for spam filtering
Proceedings of the 2006 ACM symposium on Applied computing
Catching spam before it arrives: domain specific dynamic blacklists
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
FeedMe: a collaborative alert filtering system
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
A multi-attribute, multi-weight clustering approach to managing ";e-mail overload"
Decision Support Systems
Workload models of spam and legitimate e-mails
Performance Evaluation
DMTP: Controlling spam through message delivery differentiation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Learning spam: simple techniques for freely-available software
ATEC '03 Proceedings of the annual conference on USENIX Annual Technical Conference
Improving spam detection based on structural similarity
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
Unsolicited Commercial E-Mail: Empirical Analysis of a Digital Commons
International Journal of Electronic Commerce
Fighting unicode-obfuscated spam
Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit
Searching for Interacting Features for Spam Filtering
ISNN '08 Proceedings of the 5th international symposium on Neural Networks: Advances in Neural Networks
Journal of Computer Security
Can markets help?: applying market mechanisms to improve synchronous communication
Proceedings of the 2008 ACM conference on Computer supported cooperative work
Supporting collaborative task management in e-mail
Human-Computer Interaction
Pricing electronic mail to solve the problem of spam
Human-Computer Interaction
Proceedings of the Second European Workshop on System Security
Journal of Computer Security - Best papers of the Sec Track at the 2006 ACM Symposium
An anti-spam scheme using pre-challenges
Computer Communications
Anti-spam Filters Based on Support Vector Machines
ISICA '09 Proceedings of the 4th International Symposium on Advances in Computation and Intelligence
A trustworthy email system based on instant messaging
BIS'07 Proceedings of the 10th international conference on Business information systems
Impact from mobile SPAM mail on mobile internet services
ISPA'03 Proceedings of the 2003 international conference on Parallel and distributed processing and applications
Spam detection based on a hierarchical self-organizing map
ICIC'09 Proceedings of the Intelligent computing 5th international conference on Emerging intelligent computing technology and applications
SureMsg: a XMPP-based security e-mail system
International Journal of Intelligent Information and Database Systems
A study of spam filtering using support vector machines
Artificial Intelligence Review
A Framework for Large-Scale Detection of Web Site Defacements
ACM Transactions on Internet Technology (TOIT)
Enhanced Topic-based Vector Space Model for semantics-aware spam filtering
Expert Systems with Applications: An International Journal
E-commerce: protecting purchaser privacy to enforce trust
Electronic Commerce Research
Two phase approach for spam-mail filtering
CIS'04 Proceedings of the First international conference on Computational and Information Science
Panel summary: incentives, markets and information security
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
On email spamming under the shadow of large scale use of identity-based encryption
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
ISMIS'05 Proceedings of the 15th international conference on Foundations of Intelligent Systems
A two-stage feature selection method for text categorization
Computers & Mathematics with Applications
Speculations on the science of web user security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Reversing the effects of tokenisation attacks against content-based spam filters
International Journal of Security and Networks
On the hardness of evading combinations of linear classifiers
Proceedings of the 2013 ACM workshop on Artificial intelligence and security
Hi-index | 48.27 |