Fighting spam using social GateKeepers
暂无分享,去创建一个
Xiaoming Fu | Nishanth R. Sastry | Nishanth Sastry | Sufian Hameed | Pan Hui | Pan Hui | Xiaoming Fu | S. Hameed
[1] He Liu,et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain , 2011, 2011 IEEE Symposium on Security and Privacy.
[2] Bülent Yener,et al. Graph Theoretic and Spectral Analysis of Enron Email Data , 2005, Comput. Math. Organ. Theory.
[3] Wolfgang Nejdl,et al. MailRank: using ranking for spam detection , 2005, CIKM '05.
[4] John C. Klensin,et al. Simple Mail Transfer Protocol , 2001, RFC.
[5] S. Bornholdt,et al. Scale-free topology of e-mail networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[6] Chris Kanich,et al. Spamalytics: an empirical analysis of spam marketing conversion , 2008, CCS.
[7] Ben Y. Zhao,et al. User interactions in social networks and their implications , 2009, EuroSys '09.
[8] Xiaoming Fu,et al. Identity based email sender authentication for spam mitigation , 2013, Eighth International Conference on Digital Information Management (ICDIM 2013).
[9] Krishna P. Gummadi,et al. Measurement and analysis of online social networks , 2007, IMC '07.
[10] Luis Enrique Sánchez,et al. Information and Knowledge Management , 2012 .
[11] Xiaoming Fu,et al. iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation , 2012, SECRYPT.
[12] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[13] Stanley Milgram,et al. An Experimental Study of the Small World Problem , 1969 .
[14] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .
[15] Michael Sirivianos,et al. SocialFilter: Introducing social trust to collaborative spam mitigation , 2010, 2011 Proceedings IEEE INFOCOM.
[16] Jafar Adibi,et al. The Enron Email Dataset Database Schema and Brief Statistical Report , 2004 .
[17] David Mazières,et al. RE: Reliable Email , 2006, NSDI.
[18] Brian D. Davison,et al. Identifying link farm spam pages , 2005, WWW '05.
[19] Krishna P. Gummadi,et al. Ostra: Leveraging Trust to Thwart Unwanted Communication , 2008, NSDI.
[20] Haiying Shen,et al. SOAP: A Social network Aided Personalized and effective spam filter to clean your e-mail box , 2011, 2011 Proceedings IEEE INFOCOM.
[21] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[22] P. Oscar Boykin,et al. Personal Email Networks: An Effective Anti-Spam Tool , 2004, ArXiv.
[23] P. Oscar Boykin,et al. Leveraging social networks to fight spam , 2005, Computer.
[24] Xiaoming Fu,et al. LENS: Leveraging social networking and trust to prevent spam transmission , 2011, 2011 19th IEEE International Conference on Network Protocols.
[25] John C. Klensin,et al. Simple Mail Transfer Protocol , 2001, RFC.