Login / Signup
CEAS
2004
2007
2011
2004
2011
Keyphrases
Publications
2011
Anirudh Ramachandran
,
Anirban Dasgupta
,
Nick Feamster
,
Kilian Q. Weinberger
Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems.
CEAS
(2011)
Tatsuya Mori
,
Kazumichi Sato
,
Yousuke Takahashi
,
Keisuke Ishibashi
How is e-mail sender authentication used and misused?
CEAS
(2011)
John S. Whissell
,
Charles L. A. Clarke
Clustering for semi-supervised spam filtering.
CEAS
(2011)
Jernej Porenta
,
Mojca Ciglaric
Empirical comparison of IP reputation databases.
CEAS
(2011)
De Wang
,
Danesh Irani
,
Calton Pu
A social-spam detection framework.
CEAS
(2011)
Marco Túlio Ribeiro
,
Pedro Henrique Calais Guerra
,
Leonardo Vilela
,
Adriano Veloso
,
Dorgival O. Guedes
,
Wagner Meira Jr.
,
Marcelo H. P. C. Chaves
,
Klaus Steding-Jessen
,
Cristine Hoepers
Spam detection using web page content: a new battleground.
CEAS
(2011)
Sidharth Chhabra
,
Anupama Aggarwal
,
Fabrício Benevenuto
,
Ponnurangam Kumaraguru
Phi.sh/$oCiaL: the phishing landscape through short URLs.
CEAS
(2011)
Shaghayegh Jaberi
,
Amir Masoud Rahmani
,
Ahmad Khademzadeh
Trusted data fusion by using cellular automata in wireless sensor networks.
CEAS
(2011)
Jay Pujara
,
Hal Daumé III
,
Lise Getoor
Using classifier cascades for scalable e-mail classification.
CEAS
(2011)
Mahmoud Khonji
,
Youssef Iraqi
,
Andrew Jones
Lexical URL analysis for discriminating phishing and legitimate websites.
CEAS
(2011)
Olivier Thonnard
,
Marc Dacier
A strategic analysis of spam botnets operations.
CEAS
(2011)
Fernando Sanchez
,
Zhenhai Duan
,
Yingfei Dong
Blocking spam by separating end-user machines from legitimate mail server machines.
CEAS
(2011)
The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS 2011, Perth, Australia, September 1-2, 2011, Proceedings
CEAS
(2011)
Jafar Haadi Jafarian
,
Ali Abbasi
,
Siavash Safaei Sheikhabadi
A gray-box DPDA-based intrusion detection technique using system-call monitoring.
CEAS
(2011)
Carlos Laorden
,
Xabier Ugarte-Pedrero
,
Igor Santos
,
Borja Sanz
,
Pablo García Bringas
Enhancing scalability in anomaly-based email spam filtering.
CEAS
(2011)
Michael G. Kaplan
Automatic authentication of email servers and personal computers independent of the active participation of server administrators or personal computer users.
CEAS
(2011)
Cheng Hsin Hsu
,
Polo Wang
,
Samuel Pu
Identify fixed-path phishing attack by STC.
CEAS
(2011)
Adrian E. McElligott
A security pass for messages: message keys.
CEAS
(2011)
Farida Ridzuan
,
Vidyasagar M. Potdar
,
Jaipal Singh
Storage cost of spam 2.0 in a web discussion forum.
CEAS
(2011)
Yuan Tian
,
Biao Song
,
Eui-nam Huh
Dynamic content-based cloud data integration system with privacy and cost concern.
CEAS
(2011)
Mahmoud Khonji
,
Andrew Jones
,
Youssef Iraqi
A study of feature subset evaluators and feature subset searching methods for phishing classification.
CEAS
(2011)
Igor Santos
,
Xabier Ugarte-Pedrero
,
Borja Sanz
,
Carlos Laorden
,
Pablo García Bringas
Collective classification for packed executable identification.
CEAS
(2011)
Andrew G. West
,
Jian Chang
,
Krishna K. Venkatasubramanian
,
Oleg Sokolsky
,
Insup Lee
Link spamming Wikipedia for profit.
CEAS
(2011)
Giacomo Fiumara
,
Massimo Marchi
,
Rosamaria Pagano
,
Alessandro Provetti
,
N. Spada
A rule-based system for end-user e-mail annotations.
CEAS
(2011)
Yutaro Fujii
,
Takuya Yoshimura
,
Takayuki Ito
Filtering harmful sentences based on three-word co-occurrence.
CEAS
(2011)
Binod Gyawali
,
Thamar Solorio
,
Manuel Montes-y-Gómez
,
Brad Wardman
,
Gary Warner
Evaluating a semisupervised approach to phishing url identification in a realistic scenario.
CEAS
(2011)
Andrew G. West
,
Insup Lee
Towards the effective temporal association mining of spam blacklists.
CEAS
(2011)