


default search action
8. CEAS 2011: Perth, Australia
- Vidyasagar M. Potdar:
The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS 2011, Perth, Australia, September 1-2, 2011, Proceedings. ACM 2011, ISBN 978-1-4503-0788-8 - Jafar Haadi Jafarian, Ali Abbasi
, Siavash Safaei Sheikhabadi:
A gray-box DPDA-based intrusion detection technique using system-call monitoring. 1-12 - Carlos Laorden
, Xabier Ugarte-Pedrero, Igor Santos
, Borja Sanz
, Pablo García Bringas
:
Enhancing scalability in anomaly-based email spam filtering. 13-22 - Igor Santos
, Xabier Ugarte-Pedrero, Borja Sanz
, Carlos Laorden
, Pablo García Bringas
:
Collective classification for packed executable identification. 23-30 - Tatsuya Mori
, Kazumichi Sato, Yousuke Takahashi, Keisuke Ishibashi:
How is e-mail sender authentication used and misused? 31-37 - Michael G. Kaplan:
Automatic authentication of email servers and personal computers independent of the active participation of server administrators or personal computer users. 38-45 - De Wang, Danesh Irani, Calton Pu:
A social-spam detection framework. 46-54 - Jay Pujara, Hal Daumé III, Lise Getoor:
Using classifier cascades for scalable e-mail classification. 55-63 - Yutaro Fujii, Takuya Yoshimura, Takayuki Ito:
Filtering harmful sentences based on three-word co-occurrence. 64-72 - Andrew G. West, Insup Lee:
Towards the effective temporal association mining of spam blacklists. 73-82 - Marco Túlio Ribeiro, Pedro Henrique Calais Guerra, Leonardo Vilela, Adriano Veloso, Dorgival O. Guedes
, Wagner Meira Jr., Marcelo H. P. C. Chaves
, Klaus Steding-Jessen, Cristine Hoepers:
Spam detection using web page content: a new battleground. 83-91 - Sidharth Chhabra, Anupama Aggarwal, Fabrício Benevenuto
, Ponnurangam Kumaraguru:
Phi.sh/$oCiaL: the phishing landscape through short URLs. 92-101 - Giacomo Fiumara, Massimo Marchi, Rosamaria Pagano, Alessandro Provetti
, N. Spada:
A rule-based system for end-user e-mail annotations. 102-108 - Mahmoud Khonji, Youssef Iraqi
, Andrew Jones
:
Lexical URL analysis for discriminating phishing and legitimate websites. 109-115 - Fernando Sanchez, Zhenhai Duan, Yingfei Dong:
Blocking spam by separating end-user machines from legitimate mail server machines. 116-124 - John S. Whissell, Charles L. A. Clarke:
Clustering for semi-supervised spam filtering. 125-134 - Mahmoud Khonji, Andrew Jones
, Youssef Iraqi
:
A study of feature subset evaluators and feature subset searching methods for phishing classification. 135-144 - Shaghayegh Jaberi, Amir Masoud Rahmani
, Ahmad Khademzadeh:
Trusted data fusion by using cellular automata in wireless sensor networks. 145-151 - Andrew G. West, Jian Chang, Krishna K. Venkatasubramanian, Oleg Sokolsky, Insup Lee:
Link spamming Wikipedia for profit. 152-161 - Olivier Thonnard, Marc Dacier
:
A strategic analysis of spam botnets operations. 162-171 - Cheng Hsin Hsu, Polo Wang, Samuel Pu:
Identify fixed-path phishing attack by STC. 172-175 - Binod Gyawali, Thamar Solorio, Manuel Montes-y-Gómez, Brad Wardman, Gary Warner:
Evaluating a semisupervised approach to phishing url identification in a realistic scenario. 176-183 - Adrian E. McElligott:
A security pass for messages: message keys. 184-192 - Yuan Tian, Biao Song, Eui-nam Huh:
Dynamic content-based cloud data integration system with privacy and cost concern. 193-199 - Farida Ridzuan
, Vidyasagar M. Potdar
, Jaipal Singh:
Storage cost of spam 2.0 in a web discussion forum. 200-209 - Anirudh Ramachandran, Anirban Dasgupta
, Nick Feamster, Kilian Q. Weinberger:
Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems. 210-219 - Jernej Porenta, Mojca Ciglaric:
Empirical comparison of IP reputation databases. 220-226

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.