-
2
-
-
85180527619
-
-
Pyzor. http://pyzor.sourceforge.net/.
-
Pyzor
-
-
-
3
-
-
58149086471
-
-
Sorbs DNSBL. http://www.sorbs.net.
-
Sorbs DNSBL
-
-
-
6
-
-
84885940513
-
-
Vipul’s razor. http://razor.sourceforge.net/.
-
Vipul’s razor
-
-
-
9
-
-
77956146035
-
-
Technical Report 2009-01, Stevens Institute of Technology, Hoboken, NJ, USA, April
-
D. Dittrich, M. D. Bailey, and S. Dietrich. Towards community standards for ethical behavior in computer security research. Technical Report 2009-01, Stevens Institute of Technology, Hoboken, NJ, USA, April 2009.
-
(2009)
Towards community standards for ethical behavior in computer security research
-
-
Dittrich, D.1
Bailey, M. D.2
Dietrich, S.3
-
10
-
-
0032594950
-
Support vector machines for spam categorization
-
H. Drucker, V. Vapnik, and D. Wu. Support vector machines for spam categorization. IEEE Transactions on Neural Networks, 10(5):1048–1054, 1999.
-
(1999)
IEEE Transactions on Neural Networks
, vol.10
, Issue.5
, pp. 1048-1054
-
-
Drucker, H.1
Vapnik, V.2
Wu, D.3
-
11
-
-
85041447270
-
Detecting Spammers with SNARE: Spatiotemporal Network-level Automatic Reputation Engine
-
Montreal, Canada, August
-
S. Hao, N. A. Syed, N. Feamster, A. Gray, and S. Krasser. Detecting Spammers with SNARE: Spatiotemporal Network-level Automatic Reputation Engine. In Usenix Security’09, Montreal, Canada, August 2009.
-
(2009)
Usenix Security’09
-
-
Hao, S.1
Syed, N. A.2
Feamster, N.3
Gray, A.4
Krasser, S.5
-
12
-
-
70349272437
-
Spamalytics: an empirical analysis of spam marketing conversion
-
New York, NY, USA, ACM
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. Spamalytics: an empirical analysis of spam marketing conversion. In CCS’08: Proceedings of the 15th ACM conference on Computer and communications security, pages 3–14, New York, NY, USA, 2008. ACM.
-
(2008)
CCS’08: Proceedings of the 15th ACM conference on Computer and communications security
, pp. 3-14
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G. M.5
Paxson, V.6
Savage, S.7
-
14
-
-
77955356669
-
-
April
-
McAfee and I. International. The carbon footprint of email spam report. http://newsroom.mcafee.com/images/10039/carbonfootprint2009.pdf, April 2009.
-
(2009)
The carbon footprint of email spam report
-
-
-
16
-
-
85084095941
-
Exploiting machine learning to subvert your spam filter
-
April
-
B. Nelson, M. Barreno, F. J. Chi, A. D. Joseph, B. I. P. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, and K. Xia. Exploiting machine learning to subvert your spam filter. In First USENIX Workshop on Large-Scale Exploits and Emergent Threats, April 2008.
-
(2008)
First USENIX Workshop on Large-Scale Exploits and Emergent Threats
-
-
Nelson, B.1
Barreno, M.2
Chi, F. J.3
Joseph, A. D.4
Rubinstein, B. I. P.5
Saini, U.6
Sutton, C.7
Tygar, J. D.8
Xia, K.9
-
17
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
New York, NY, USA, ACM Press
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multifaceted approach to understanding the botnet phenomenon. In IMC’06: Proceedings of the 6th ACM SIGCOMM on Internet measurement, pages 41–52, New York, NY, USA, 2006. ACM Press.
-
(2006)
IMC’06: Proceedings of the 6th ACM SIGCOMM on Internet measurement
, pp. 41-52
-
-
Rajab, M. A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
19
-
-
33750365498
-
Understanding the network-level behavior of spammers
-
New York, NY, USA, ACM Press
-
A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. In SIGCOMM’06: Conference on Applications, technologies, architectures, and protocols for computer communications, pages 291–302, New York, NY, USA, 2006. ACM Press.
-
(2006)
SIGCOMM’06: Conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 291-302
-
-
Ramachandran, A.1
Feamster, N.2
-
20
-
-
77952388137
-
Filtering spam with behavioral blacklisting
-
New York, NY, USA, ACM
-
A. Ramachandran, N. Feamster, and S. Vempala. Filtering spam with behavioral blacklisting. In CCS’07: Proceedings of the 14th ACM conference on Computer and communications security, pages 342–351, New York, NY, USA, 2007. ACM.
-
(2007)
CCS’07: Proceedings of the 14th ACM conference on Computer and communications security
, pp. 342-351
-
-
Ramachandran, A.1
Feamster, N.2
Vempala, S.3
-
22
-
-
0009304541
-
A bayesian approach to filtering junk e-mail
-
M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz. A bayesian approach to filtering junk e-mail. In AAAI-98 Workshop on Learning for Text Categorization, pages 55–62, 1998.
-
(1998)
AAAI-98 Workshop on Learning for Text Categorization
, pp. 55-62
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
25
-
-
85180542840
-
-
Unspam Technologies
-
Unspam Technologies. Project Honey Pot. http://projecthoneypot.org, 2008.
-
(2008)
Project Honey Pot
-
-
-
26
-
-
70350215415
-
Exploiting network structure for proactive spam mitigation
-
Berkeley, CA, USA, USENIX Association
-
S. Venkataraman, S. Sen, O. Spatscheck, P. Haffner, and D. Song. Exploiting network structure for proactive spam mitigation. In Proceedings of 16th USENIX Security Symposium, pages 1–18, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
Proceedings of 16th USENIX Security Symposium
, pp. 1-18
-
-
Venkataraman, S.1
Sen, S.2
Spatscheck, O.3
Haffner, P.4
Song, D.5
-
29
-
-
84876278697
-
How dynamic are IP addresses?
-
New York, USA
-
Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldszmidt, and T. Wobber. How dynamic are IP addresses? In SIGCOMM ’07: Conference on Applications, technologies, architectures, and protocols for computer communications, pages 301–312, New York, USA, 2007.
-
(2007)
SIGCOMM ’07: Conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 301-312
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Gillum, E.4
Goldszmidt, M.5
Wobber, T.6
-
30
-
-
65249165325
-
Spamming botnets: signatures and characteristics
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming botnets: signatures and characteristics. SIGCOMM Comput. Commun. Rev., 38(4):171–182, 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev
, vol.38
, Issue.4
, pp. 171-182
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
|