Personalized E-mail Filtering System Based on Usage Control
暂无分享,去创建一个
[1] Xu Zhou,et al. A LVQ-based neural network anti-spam email approach , 2005, OPSR.
[2] Gao Qian. The invasion and defense of spam , 2008 .
[3] Ernesto Damiani,et al. P2P-based collaborative spam detection and filtering , 2004 .
[4] R.F. Erbacher,et al. An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.
[5] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.
[6] Virgílio A. F. Almeida,et al. Characterizing a spam traffic , 2004, IMC '04.
[7] Wenqing Zhao,et al. An Email Classification Scheme Based on Decision-Theoretic Rough Set Theory and Analysis of Email Security , 2005, TENCON 2005 - 2005 IEEE Region 10 Conference.
[8] Emil Sit,et al. An empirical study of spam traffic and the use of DNS black lists , 2004, IMC '04.
[9] Chih-Chien Wang,et al. Using header session messages to anti-spamming , 2007, Comput. Secur..
[10] Jalal Almhana,et al. Adaptive filtering of spam , 2004, Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004..
[11] Chia-Mei Chen,et al. An Alliance-Based Anti-spam Approach , 2007, Third International Conference on Natural Computation (ICNC 2007).
[12] Zhanting Yuan,et al. Application of Refined LSA and MD5 Algorithms in Spam Filtering , 2009, J. Comput..
[13] Otávio Augusto S. Carpinteiro,et al. A Neural Model in Anti-spam Systems , 2006, ICANN.
[14] Li Wei,et al. Spam Filtering by Stages , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[15] H. Labiod,et al. A Prior Distribution for Anti-spam Statistical Bayesian Model , 2009, 2009 International Conference on Network and Service Security.
[16] Kartik Gopalan,et al. DMTP: Controlling spam through message delivery differentiation , 2006, Comput. Networks.
[17] Biju Issac,et al. Improved Bayesian Anti-Spam Filter Implementation and Analysis on Independent Spam Corpuses , 2009, 2009 International Conference on Computer Engineering and Technology.
[18] Lu Xianliang,et al. A LVQ-based neural network anti-spam email approach , 2005 .
[19] Barry Leiba,et al. DomainKeys Identified Mail (DKIM): Using Digital Signatures for Domain Verification , 2007, CEAS.
[20] Stefan Savage,et al. Slicing Spam with Occam's Razor , 2007, CEAS.
[21] Jaehong Park,et al. Formal model and policy specification of usage control , 2005, TSEC.
[22] Zhen-fang Zhu,et al. Research on E-mail Filtering Based On Improved Bayesian , 2009, J. Comput..