메뉴 건너뛰기




Volumn , Issue , 2010, Pages 92-97

A collaborative approach for spam detection

Author keywords

Collaboration; Electronic mail; Filtering; Spam

Indexed keywords

ANTI-SPAM; COLLABORATION; COLLABORATIVE APPROACH; E-MAIL (SPAM); EMAIL SERVICES; END-USERS; FILTERING; NETWORKING SERVICES; RESEARCH EFFORTS; SPAM; SPAM DETECTION; SPAM FILTER;

EID: 78649827756     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INTERNET.2010.25     Document Type: Conference Paper
Times cited : (4)

References (17)
  • 1
    • 78649887418 scopus 로고    scopus 로고
    • Email metrics program: The network operators' perspective
    • Messaging Anti-Abuse Working Group S. Francisco CA, USA, March
    • Messaging Anti-Abuse Working Group. Email Metrics Program: The Network Operators' Perspective. Report #10 - third and fourth quarter 2008, S. Francisco CA, USA, March 2009.
    • (2009) Report #10 - Third and Fourth Quarter 2008
  • 2
    • 33750365498 scopus 로고    scopus 로고
    • Understanding the network-level behavior of spammers
    • A. Ramachandran and N. Feamster. Understanding the Network-Level Behavior of Spammers. In Proc. of SIG-COMM'06, pp. 291-302, 2006.
    • (2006) Proc. of SIG-COMM'06 , pp. 291-302
    • Ramachandran, A.1    Feamster, N.2
  • 4
  • 6
    • 51349149626 scopus 로고    scopus 로고
    • ALPACAS:A largescale privacy-aware collaborative antispam system
    • Z. Zhong et al., ALPACAS:A Largescale Privacy-Aware Collaborative Antispam System, Proc. INFOCOM, pp. 556-564, 2008.
    • (2008) Proc. INFOCOM , pp. 556-564
    • Zhong, Z.1
  • 10
    • 68549094221 scopus 로고    scopus 로고
    • A survey of learning-based techniques of email spam filtering
    • E. Blanzieri and A. Bryl. A survey of learning-based techniques of email spam filtering. Artificial Intelligence Review, 29(1):63-92, 2008.
    • (2008) Artificial Intelligence Review , vol.29 , Issue.1 , pp. 63-92
    • Blanzieri, E.1    Bryl, A.2
  • 11
    • 0037942868 scopus 로고    scopus 로고
    • Data mining standards initiatives
    • R. Grossman, M. Hornick, and G. Meyer, Data Mining Standards Initiatives, Communications of ACM, vol. 45, no. 8, pp. 59-61, 2002.
    • (2002) Communications of ACM , vol.45 , Issue.8 , pp. 59-61
    • Grossman, R.1    Hornick, M.2    Meyer, G.3
  • 13
    • 14844357779 scopus 로고    scopus 로고
    • Preventing session table explosion in packet inspection computers
    • H. Kim et al., Preventing session table explosion in packet inspection computers, IEEE Trans. on Computers, pp. 238-240, 2005.
    • (2005) IEEE Trans. on Computers , pp. 238-240
    • Kim, H.1
  • 14
    • 45749109010 scopus 로고    scopus 로고
    • Sybil-guard: Defending against sybil attacks via social networks
    • H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, Sybil-guard: Defending against sybil attacks via social networks, IEEE/ACM Trans. on Networking (TON), vol. 16, no. 3, pp. 576-589, 2008.
    • (2008) IEEE/ACM Trans. on Networking (TON) , vol.16 , Issue.3 , pp. 576-589
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.3    Flaxman, A.4
  • 17
    • 33646023117 scopus 로고    scopus 로고
    • An introduction to ROC analysis
    • T. Fawcett, An introduction to ROC analysis, Pattern recognition letters, vol. 27, no. 8, pp. 861874, 2006.
    • (2006) Pattern Recognition Letters , vol.27 , Issue.8 , pp. 861-874
    • Fawcett, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.