-
1
-
-
84949626334
-
Spamscatter: Characterizing internet scam hosting infrastructure
-
Anderson, D. S., Fleizach, C., Savage, S., & Voelker, G. M. (2007). Spamscatter: Characterizing internet scam hosting infrastructure. USENIX Security.
-
(2007)
USENIX Security
-
-
Anderson, D.S.1
Fleizach, C.2
Savage, S.3
Voelker, G.M.4
-
2
-
-
34547361229
-
Honeyspam: Honeypots fighting spam at the source
-
Berkeley, CA, USA: USENIX Association
-
Andreolini, M., Bulgarelli, A., Colajanni, M., & Mazzoni, F. (2005). Honeyspam: honeypots fighting spam at the source. SRUTI'05: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop (pp. 11{11). Berkeley, CA, USA: USENIX Association.
-
(2005)
SRUTI'05: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
, pp. 11-11
-
-
Andreolini, M.1
Bulgarelli, A.2
Colajanni, M.3
Mazzoni, F.4
-
3
-
-
0002636321
-
N-gram-based text categorization
-
Las Vegas, US
-
Cavnar, W., & Trenkle, J. (1994). N-gram-based text categorization. Proceedings of SDAIR-94, 3rd Annual Symposium on Document Analysis and Information Retrieval (pp. 161{175). Las Vegas, US.
-
(1994)
Proceedings of SDAIR-94, 3rd Annual Symposium on Document Analysis and Information Retrieval
, pp. 161-175
-
-
Cavnar, W.1
Trenkle, J.2
-
4
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
Berkeley, CA, USA: USENIX Association
-
Cooke, E., Jahanian, F., & McPherson, D. (2005). The zombie roundup: understanding, detecting, and disrupting botnets. SRUTI'05: Proceedings of the Steps to Reducing Unwanted Traffic on the Inter-net on Steps to Reducing Unwanted Traffic on the Internet Workshop (pp. 6{6). Berkeley, CA, USA: USENIX Association.
-
(2005)
SRUTI'05: Proceedings of the Steps to Reducing Unwanted Traffic on the Inter-net on Steps to Reducing Unwanted Traffic on the Internet Workshop
, pp. 6-6
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
10
-
-
33750365498
-
Understanding the network-level behavior of spammers
-
New York, NY, USA: ACM
-
Ramachandran, A., & Feamster, N. (2006). Understanding the network-level behavior of spammers. SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications (pp. 291{302). New York, NY, USA: ACM.
-
(2006)
SIGCOMM '06: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 291-302
-
-
Ramachandran, A.1
Feamster, N.2
-
13
-
-
25144439604
-
-
Addison-Wesley Longman Publishing Co
-
Tan, P., Steinbach, M., & Kumar, V. (2005). Introduction to data mining, (first edition). Addison-Wesley Longman Publishing Co.
-
(2005)
Introduction to Data Mining, (First Edition)
-
-
Tan, P.1
Steinbach, M.2
Kumar, V.3
-
14
-
-
84904804970
-
Filtering image spam with nearduplicate detection
-
Mountain View, CA. Mountain View, CA
-
Wang, Z., Josephson, W., Lv, Q., Charikar, M., & Li, K. (2007). Filtering image spam with nearduplicate detection. Proceedings of the Fourth Conference on Email and Anti-Spam (CEAS). Mountain View, CA. Mountain View, CA.
-
(2007)
Proceedings of the Fourth Conference on Email and Anti-Spam (CEAS)
-
-
Wang, Z.1
Josephson, W.2
Lv, Q.3
Charikar, M.4
Li, K.5
|