Fighting the spam wars: A remailer approach with restrictive aliasing
ACM Transactions on Internet Technology (TOIT)
Detecting mass-mailing worm infected hosts by mining DNS traffic data
Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data
Developing real-world programming assignments for CS1
Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education
Fast statistical spam filter by approximate classifications
SIGMETRICS '06/Performance '06 Proceedings of the joint international conference on Measurement and modeling of computer systems
Online supervised spam filter evaluation
ACM Transactions on Information Systems (TOIS)
Spam Filtering Using Statistical Data Compression Models
The Journal of Machine Learning Research
Raising the baseline for high-precision text classifiers
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Spam filtering for short messages
Proceedings of the sixteenth ACM conference on Conference on information and knowledge management
Exploiting machine learning to subvert your spam filter
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
Information Processing and Management: an International Journal
Collaborative spam filtering with heterogeneous agents
Expert Systems with Applications: An International Journal
Email Spam Filtering: A Systematic Review
Foundations and Trends in Information Retrieval
Open problems in the security of learning
Proceedings of the 1st ACM workshop on Workshop on AISec
Bayesian bot detection based on DNS traffic similarity
Proceedings of the 2009 ACM symposium on Applied Computing
Spam filter evaluation with imprecise ground truth
Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval
Multimedia Tools and Applications
Secured and trusted three-tier grid architecture
International Journal of Ad Hoc and Ubiquitous Computing
Extending black domain name list by using co-occurrence relation between DNS queries
LEET'10 Proceedings of the 3rd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more
A new feature selection algorithm based on binomial hypothesis testing for spam filtering
Knowledge-Based Systems
A survey and experimental evaluation of image spam filtering techniques
Pattern Recognition Letters
Collective classification for spam filtering
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Enhancing scalability in anomaly-based email spam filtering
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
Bagging classifiers for fighting poisoning attacks in adversarial classification tasks
MCS'11 Proceedings of the 10th international conference on Multiple classifier systems
Proceedings of the 4th ACM workshop on Security and artificial intelligence
Application and evaluation of bayesian filter for chinese spam
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Improved bayesian spam filtering based on co-weighted multi-area information
PAKDD'05 Proceedings of the 9th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
Hi-index | 0.01 |
Can mathematics tell spam apart from legitimate mail? Find out which approaches work best in real-world tests.