On the recent use of email through traffic and network analysis: the impact of OSNs, new trends, and other communication platforms
暂无分享,去创建一个
[1] Marco Chiesa,et al. Analysis of country-wide internet outages caused by censorship , 2011, IMC '11.
[2] Fabián E. Bustamante,et al. Distributed systems and natural disasters: BitTorrent as a global witness , 2011, SWID '11.
[3] Kensuke Fukuda,et al. MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking , 2010, CoNEXT.
[4] Virgílio A. F. Almeida,et al. Characterizing user behavior in online social networks , 2009, IMC '09.
[5] Anja Feldmann,et al. Understanding online social network usage from a network perspective , 2009, IMC '09.
[6] Ziqiang Wang,et al. Using LPP and LS-SVM for spam filtering , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.
[7] Ming-Syan Chen,et al. Incremental SVM Model for Spam Detection on Dynamic Email Social Networks , 2009, 2009 International Conference on Computational Science and Engineering.
[8] Krishna P. Gummadi,et al. On the evolution of user interaction in Facebook , 2009, WOSN '09.
[9] Kensuke Fukuda,et al. Seven Years and One Day: Sketching the Evolution of Internet Traffic , 2009, IEEE INFOCOM 2009.
[10] J. Baltazar,et al. Show Me the Money! The Monetization of KOOBFACE , 2009 .
[11] Bud Mishra,et al. Modeling and simulation of e-mail social networks: A new stochastic agent-based approach , 2008, 2008 Winter Simulation Conference.
[12] Kevin Borders,et al. Social networks and context-aware spam , 2008, CSCW.
[13] Antonio Pescapè,et al. Internet traffic modeling by means of Hidden Markov Models , 2008, Comput. Networks.
[14] Craig Partridge,et al. The Technical Development of Internet Email , 2008, IEEE Annals of the History of Computing.
[15] Markus Rupp,et al. Modeling E-Mail Traffic for 3G Mobile Networks , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.
[16] Kensuke Fukuda,et al. Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures , 2007, LSAD '07.
[17] Richard Clayton. Email traffic: a quantitative snapshot , 2007, CEAS.
[18] Antonio Pescapè,et al. Searching for invariants in network games traffic , 2006, CoNEXT '06.
[19] Bernardo A. Huberman,et al. Rhythms of social interaction: messaging within a massive online network , 2006, ArXiv.
[20] Polly Huang,et al. GEN02-3: On the Search of Internet AS-level Topology Invariants , 2006, IEEE Globecom 2006.
[21] Antonio Pescapè,et al. A packet-level characterization of network traffic , 2006, 2006 11th International Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks.
[22] Michael Negnevitsky,et al. E-mail Traffic Analysis Using Visualisation and Decision Trees , 2006, ISI.
[23] A. Kuh,et al. On Randomly Evolving Email Networks , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[24] Rahul Ohri. Measurement-Based E-Mail Traffic Characterization , 2005 .
[25] Robert E. Filman. When Email Was Good , 2003, IEEE Internet Comput..
[26] Yvonne Rogers,et al. Managing one's Social Network: Does Age Make a Difference? , 2003, INTERACT.
[27] Leysia Palen,et al. Instant messaging in teen life , 2002, CSCW '02.
[28] S. Bornholdt,et al. Scale-free topology of e-mail networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[29] Sally Floyd,et al. Difficulties in simulating the internet , 2001, TNET.
[30] Gregory M. Vaudreuil. SMTP Service Extensions for Transmission of Large and Binary MIME Messages , 1995, RFC.
[31] M. E. Johnson,et al. Estimating model discrepancy , 1990 .
[32] Azriel Rosenfeld,et al. O(log n) bimodality analysis , 1989, Pattern Recognit..
[33] D. W. Scott. On optimal and data based histograms , 1979 .