-
2
-
-
34547361229
-
HoneySpam: Honeypots fighting spam at the source
-
Berkeley, CA, USA, USENIX Association
-
M. Andreolini, A. Bulgarelli, M. Colajanni, and F. Mazzoni. Honeyspam: honeypots fighting spam at the source. In SRUTI’05: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, pages 11–11, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
SRUTI’05: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop
, pp. 11
-
-
Andreolini, M.1
Bulgarelli, A.2
Colajanni, M.3
Mazzoni, F.4
-
5
-
-
85075111298
-
-
Bl: Spamcop blocking list. http://bl.spamcop.net
-
Bl: Spamcop blocking list. http://bl.spamcop.net.
-
-
-
-
8
-
-
85075107598
-
-
Cbl: Composite blocking list. http://cbl.abuseat.org
-
Cbl: Composite blocking list. http://cbl.abuseat.org/.
-
-
-
-
9
-
-
84904810805
-
Email traffic: A quantitative snapshot
-
R. Clayton. Email traffic: a quantitative snapshot. In Proc. of CEAS, 2007.
-
(2007)
Proc. Of CEAS
-
-
Clayton, R.1
-
10
-
-
85075113236
-
-
Sorbs: Spam and open-relay blocking system. http://dnsbl.sorbs.net
-
Sorbs: Spam and open-relay blocking system. http://dnsbl.sorbs.net.
-
-
-
-
12
-
-
80054705061
-
Re: Reliable email
-
S. Garriss, M. Kaminsky, M. J. Freedman, B. Karp, D. Mazieres, and H. Yu. Re: Reliable email. In Proc. of NSDI, 2006.
-
(2006)
Proc. Of NSDI
-
-
Garriss, S.1
Kaminsky, M.2
Freedman, M.J.3
Karp, B.4
Mazieres, D.5
Yu, H.6
-
13
-
-
34247142447
-
Workload models of spam and legitimate e-mails
-
L. H. Gomes, C. Cazita, J. M. Almeida, V. Almeida, and J. Wagner Meira. Workload models of spam and legitimate e-mails. Perform. Eval., 64(7-8):690–714, 2007.
-
(2007)
Perform. Eval.
, vol.64
, Issue.7-8
, pp. 690-714
-
-
Gomes, L.H.1
Cazita, C.2
Almeida, J.M.3
Almeida, V.4
Wagner Meira, J.5
-
14
-
-
33846700978
-
Spam and the ongoing battle for the inbox
-
J. Goodman, G. V. Cormack, and D. Heckerman. Spam and the ongoing battle for the inbox. Commun. ACM, 50(2):24–33, 2007.
-
(2007)
Commun. ACM
, vol.50
, Issue.2
, pp. 24-33
-
-
Goodman, J.1
Cormack, G.V.2
Heckerman, D.3
-
15
-
-
85075109677
-
Fighting spammers with honeypots
-
11-26
-
Fighting spammers with honeypots. Laurent Oudot 2003-11-26, http://www.securityfocus.com/infocus/1747.
-
(2003)
Laurent Oudot
-
-
-
16
-
-
85075109513
-
-
Mailavenger. http://www.mailavenger.org
-
Mailavenger. http://www.mailavenger.org.
-
-
-
-
17
-
-
85075105339
-
Chung-kwei: A pattern-discovery-based system for the automatic identification of unsolicited e-mail messages (spam)
-
T. H. Isidore Rigoutsos. Chung-kwei: a pattern-discovery-based system for the automatic identification of unsolicited e-mail messages (spam). In Proc. of CEAS, 2004.
-
(2004)
Proc. Of CEAS
-
-
Isidore Rigoutsos, T.H.1
-
23
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours)
-
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. My botnet is bigger than yours (maybe, better than yours). In Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets (Hotbot), 2007.
-
(2007)
Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets (Hotbot)
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
24
-
-
33847737144
-
Understanding the network-level behavior of spammers
-
A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. In Proc. of SIGCOMM, 2006.
-
(2006)
Proc. Of SIGCOMM
-
-
Ramachandran, A.1
Feamster, N.2
-
26
-
-
85075110755
-
-
Super webscan. http://www.sharewareconnection.com/superwebscan.htm
-
Super webscan. http://www.sharewareconnection.com/superwebscan.htm.
-
-
-
-
27
-
-
0009304541
-
A bayesian approach to filtering junk e-mail
-
Madison, Wisconsin, AAAI Technical Report WS-98-05
-
M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz. A bayesian approach to filtering junk E-mail. In Learning for Text Categorization: Papers from the 1998 Workshop, Madison, Wisconsin, 1998. AAAI Technical Report WS-98-05.
-
(1998)
Learning for Text Categorization: Papers from the 1998 Workshop
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
29
-
-
85075108712
-
-
The spamhaus project. sbl-xbl.spamhaus.org
-
The spamhaus project. sbl-xbl.spamhaus.org.
-
-
-
-
32
-
-
70350215415
-
Exploiting network structure for proactive spam mitigation
-
S. Venkataraman, S. Sen, O. Spatscheck, P. Haffner, and D. Song. Exploiting network structure for proactive spam mitigation. In Proc. of Usenix Security, 2007.
-
(2007)
Proc. Of Usenix Security
-
-
Venkataraman, S.1
Sen, S.2
Spatscheck, O.3
Haffner, P.4
Song, D.5
|