A tutorial on learning with Bayesian networks
Learning in graphical models
Exploring an epidemic in an e-science environment
Communications of the ACM - Special issue: RFID
MailRank: using ranking for spam detection
Proceedings of the 14th ACM international conference on Information and knowledge management
Workload models of spam and legitimate e-mails
Performance Evaluation
Improving spam detection based on structural similarity
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
Computing relationships: transactional algorithms yield to social networks
ACM SIGCSE Bulletin
Understanding web credibility: a synthesis of the research literature
Foundations and Trends in Human-Computer Interaction
Building small worlds in unstructured P2P networks using a multiagent Bayesian inference mechanism
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
Adaptive e-mail intention finding mechanism based on e-mail words social networks
Proceedings of the 2007 workshop on Large scale attack defense
Exploiting network structure for proactive spam mitigation
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Effective spam filtering: A single-class learning and ensemble approach
Decision Support Systems
Asymmetric support vector machines: low false-positive learning under the user tolerance
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
Unsupervised retrieval of attack profiles in collaborative recommender systems
Proceedings of the 2008 ACM conference on Recommender systems
Application of social relation graphs for early detection of transient spammers
WSEAS Transactions on Information Science and Applications
Temporal evolution of social networks in Paltalk™
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
Leveraging social networking services to encourage interaction in public spaces
Proceedings of the 7th International Conference on Mobile and Ubiquitous Multimedia
Mining social networks for personalized email prioritization
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
A survey of learning-based techniques of email spam filtering
Artificial Intelligence Review
Semi Supervised Image Spam Hunter: A Regularized Discriminant EM Approach
ADMA '09 Proceedings of the 5th International Conference on Advanced Data Mining and Applications
A scalable kernel-based algorithm for semi-supervised metric learning
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
Efficient service recommendation system for cloud computing market
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Spam filtering and email-mediated applications
WImBI'06 Proceedings of the 1st WICI international conference on Web intelligence meets brain informatics
Analysis of dynamic social network: e-mail messages exchange network
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Efficient algorithms for large-scale local triangle counting
ACM Transactions on Knowledge Discovery from Data (TKDD)
Detection of spam hosts and spam bots using network flow traffic modeling
LEET'10 Proceedings of the 3rd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more
Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Merging multiple criteria to identify suspicious reviews
Proceedings of the fourth ACM conference on Recommender systems
Clustering coefficient queries on massive dynamic social networks
WAIM'10 Proceedings of the 11th international conference on Web-age information management
From a stream of relational queries to distributed stream processing
Proceedings of the VLDB Endowment
A behavior-based SMS antispam system
IBM Journal of Research and Development
EPSP: Enhancing Network Protocol with Social-Aware Plane
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Distortion as a validation criterion in the identification of suspicious reviews
Proceedings of the First Workshop on Social Media Analytics
On collection of large-scale multi-purpose datasets on internet backbone links
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security
Content-based filtering in on-line social networks
PSDML'10 Proceedings of the international ECML/PKDD conference on Privacy and security issues in data mining and machine learning
SpamWatcher: a streaming social network analytic on the IBM wire-speed processor
Proceedings of the 5th ACM international conference on Distributed event-based system
Analysis of temporal evolution of social networks
Journal of Mobile Multimedia
Robustness of dynamic social networks
Journal of Mobile Multimedia
Adaptive e-mails intention finding system based on words social networks
Journal of Network and Computer Applications
Social network analysis of web links to eliminate false positives in collaborative anti-spam systems
Journal of Network and Computer Applications
Detecting anomalies in cargo using graph properties
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Assessing the uncertainty of communication patterns in distributed intrusion detection system
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Developing intelligent applications in social e-mail networks
RSCTC'06 Proceedings of the 5th international conference on Rough Sets and Current Trends in Computing
Structure analysis of email networks by information-theoretic clustering
ISNN'10 Proceedings of the 7th international conference on Advances in Neural Networks - Volume Part II
Towards modeling legitimate and unsolicited email traffic using social network properties
Proceedings of the Fifth Workshop on Social Network Systems
Review: SMS spam filtering: Methods and data
Expert Systems with Applications: An International Journal
Innocent by association: early recognition of legitimate users
Proceedings of the 2012 ACM conference on Computer and communications security
Detecting spammers via aggregated historical data set
NSS'12 Proceedings of the 6th international conference on Network and System Security
Classifying Wikipedia articles using network motif counts and ratios
Proceedings of the Eighth Annual International Symposium on Wikis and Open Collaboration
An anomaly-based approach to the analysis of the social behavior of VoIP users
Computer Networks: The International Journal of Computer and Telecommunications Networking
SocialWatch: detection of online service abuse via large-scale social graphs
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Community-based features for identifying spammers in online social networks
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
ADVS: a reputation-based model on filtering SPIT over P2P-VoIP networks
The Journal of Supercomputing
Early detection of outgoing spammers in large-scale service provider networks
DIMVA'13 Proceedings of the 10th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Social spammer detection in microblogging
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
Hi-index | 4.10 |
Social networks are useful for judging the trustworthiness of outsiders. An automated antispam tool exploits the properties of social networks to distinguish between unsolicited commercial e-mail驴spam驴and messages associated with people the user knows.