Trusted Behavior Based Spam Filtering
暂无分享,去创建一个
[1] Grigorios Tsoumakas,et al. E-mail Mining: Emerging Techniques for E-Mail Management , 2006 .
[2] Xuan Zhang,et al. Spam Behavior Recognition Based on Session Layer Data Mining , 2006, FSKD.
[3] Catherine Rosenberg,et al. Behavioral authentication of server flows , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[4] Minh Tran,et al. FreeBSD server anti-spam software using automated TCP connection control , 2004 .
[5] Salvatore J. Stolfo,et al. EMT/MET: systems for modeling and detecting errant email , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[6] Grigorios Tsoumakas,et al. Email Mining: Emerging Techniques for Email Management , 2006 .
[7] Li Ren,et al. Bayesian Chinese Spam Filter Based on Crossed N-gram , 2006, Sixth International Conference on Intelligent Systems Design and Applications.
[8] Michaël Rusinowitch,et al. Protocol analysis in intrusion detection using decision tree , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[9] Christopher Lueg. Spam and Anti-Spam Measures: A Look at Potential Impacts , 2003 .
[10] Nitin Kumar,et al. Controlling spam Emails at the routers , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[11] 金田 重郎,et al. C4.5: Programs for Machine Learning (書評) , 1995 .
[12] Aiko M. Hormann,et al. Programs for Machine Learning. Part I , 1962, Inf. Control..
[13] Susan T. Dumais,et al. A Bayesian Approach to Filtering Junk E-Mail , 1998, AAAI 1998.
[14] Chen Ming,et al. Flow-based anti-spam , 2004, 2004 IEEE International Workshop on IP Operations and Management.
[15] J. Srivastava,et al. Analyzing Network Traffic to Detect E-Mail Spamming Machines , 2004 .