-
1
-
-
80053632867
-
-
http://hootsuite.com/.
-
-
-
-
2
-
-
80053640031
-
-
http://tweetdeck.com/.
-
-
-
-
3
-
-
80053648580
-
-
http://code.google.com/apis/opensocial/.
-
-
-
-
4
-
-
84860848688
-
Detecting spammers on twitter
-
F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting spammers on twitter. In Proceedings of the Seventh annual Collaboration, Electronic messaging, AntiAbuse and Spam Conference(CEAS 2010), 2010.
-
(2010)
Proceedings of the Seventh Annual Collaboration, Electronic Messaging, AntiAbuse and Spam Conference(CEAS 2010)
-
-
Benevenuto, F.1
Magno, G.2
Rodrigues, T.3
Almeida, V.4
-
5
-
-
84904818300
-
An anti-spam filter combination framework for text-and-image emails through incremental learning
-
B. Byun, C. Lee, S. Webb, D. Irani, and C. Pu. An anti-spam filter combination framework for text-and-image emails through incremental learning. In Proceedings of the the Sixth Conference on Email and Anti-Spam (CEAS 2009), 2009.
-
(2009)
Proceedings of the the Sixth Conference on Email and Anti-Spam (CEAS 2009)
-
-
Byun, B.1
Lee, C.2
Webb, S.3
Irani, D.4
Pu, C.5
-
9
-
-
0032594950
-
Support vector machines for spam categorization
-
H. Drucker, D. Wu, and V. Vapnik. Support vector machines for spam categorization. Neural Networks, IEEE Transactions on, 10(5):1048-1054, 1999.
-
(1999)
Neural Networks, IEEE Transactions on
, vol.10
, Issue.5
, pp. 1048-1054
-
-
Drucker, H.1
Wu, D.2
Vapnik, V.3
-
10
-
-
0034164230
-
Additive logistic regression: A statistical view of boosting
-
J. Friedman, T. Hastie, and R. Tibshirani. Additive logistic regression: a statistical view of boosting. The annals of statistics, 28(2):337-407, 2000.
-
(2000)
The Annals of Statistics
, vol.28
, Issue.2
, pp. 337-407
-
-
Friedman, J.1
Hastie, T.2
Tibshirani, R.3
-
13
-
-
76749092270
-
The WEKA data mining software
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. Witten. The WEKA data mining software. ACM SIGKDD Explorations Newsletter, 11(1):10-18, 2009.
-
(2009)
ACM SIGKDD Explorations Newsletter
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.6
-
14
-
-
0033714666
-
WebBase: A repository of web pages
-
J. Hirai, S. Raghavan, H. Garcia-Molina, and A. Paepcke. WebBase: A repository of web pages. Computer Networks, 33(1-6):277-293, 2000.
-
(2000)
Computer Networks
, vol.33
, Issue.1-6
, pp. 277-293
-
-
Hirai, J.1
Raghavan, S.2
Garcia-Molina, H.3
Paepcke, A.4
-
15
-
-
67249153096
-
Evolutionary study of phishing
-
D. Irani, S. Webb, J. Giffin, and C. Pu. Evolutionary study of phishing. eCrime Researchers Summit, 2008, pages 1-10, 2008.
-
(2008)
ECrime Researchers Summit
, vol.2008
, pp. 1-10
-
-
Irani, D.1
Webb, S.2
Giffin, J.3
Pu, C.4
-
17
-
-
84904822464
-
Study of trend-stuffing on twitter through text classification
-
D. Irani, S. Webb, C. Pu, and K. Li. Study of trend-stuffing on twitter through text classification. In Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS 2010), 2010.
-
(2010)
Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS 2010)
-
-
Irani, D.1
Webb, S.2
Pu, C.3
Li, K.4
-
18
-
-
85084096033
-
On the spam campaign trail
-
USENIX Association
-
C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. On the spam campaign trail. In Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pages 1-9. USENIX Association, 2008.
-
(2008)
Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
, pp. 1-9
-
-
Kreibich, C.1
Kanich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.5
Paxson, V.6
Savage, S.7
-
20
-
-
80053640424
-
Efficient cross-domain classification of weblogs
-
E. Lex, C. Seifert, M. Granitzer, and A. Juffinger. Efficient cross-domain classification of weblogs. International Journal of Intelligent Computing Research, 1(1), 2010.
-
(2010)
International Journal of Intelligent Computing Research
, vol.1
, Issue.1
-
-
Lex, E.1
Seifert, C.2
Granitzer, M.3
Juffinger, A.4
-
22
-
-
33751079876
-
Towards the integration of diverse spam filtering techniques
-
C. Pu, S.Webb, O. Kolesnikov, W. Lee, and R. Lipton. Towards the integration of diverse spam filtering techniques. In Proceedings of the IEEE International Conference on Granular Computing (GrC06), pages 17-20.
-
Proceedings of the IEEE International Conference on Granular Computing (GrC06)
, pp. 17-20
-
-
Pu, C.1
Webb, S.2
Kolesnikov, O.3
Lee, W.4
Lipton, R.5
-
23
-
-
0009304541
-
A Bayesian approach to filtering junk e-mail
-
Madison, Wisconsin: AAAI Technical Report WS-98-05
-
M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz. A Bayesian approach to filtering junk e-mail. In Learning for Text Categorization: Papers from the 1998 workshop, volume 62, pages 98-05. Madison, Wisconsin: AAAI Technical Report WS-98-05, 1998.
-
Learning for Text Categorization: Papers from the 1998 Workshop
, vol.62
, Issue.1998
, pp. 98-05
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
25
-
-
80051985554
-
Design and evaluation of a real-time url spam filtering service
-
K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and evaluation of a real-time url spam filtering service. In Proceedings of the IEEE Symposium on Security and Privacy, 2011.
-
(2011)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Thomas, K.1
Grier, C.2
Ma, J.3
Paxson, V.4
Song, D.5
|