The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for spam with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-1999 (19) 2000-2001 (18) 2002 (18) 2003 (60) 2004 (129) 2005 (180) 2006 (212) 2007 (257) 2008 (252) 2009 (194) 2010 (149) 2011 (159) 2012 (141) 2013 (112) 2014 (95) 2015 (118) 2016 (123) 2017 (118) 2018 (108) 2019 (115) 2020 (113) 2021 (101) 2022 (115) 2023 (104) 2024 (22)
Publication types (Num. hits)
article(1023) book(6) data(3) incollection(30) inproceedings(1940) phdthesis(24) proceedings(6)
Venues (Conferences, Journals, ...)
CEAS(161) CoRR(147) WWW(40) AIRWeb(37) Expert Syst. Appl.(32) IEEE Access(29) SIGIR(26) TREC(26) CIKM(21) Multim. Tools Appl.(19) IEEE Secur. Priv.(17) Commun. ACM(16) Comput. Secur.(16) ICDM(16) LISA(16) WWW (Companion Volume)(16) More (+10 of total 1212)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1215 occurrences of 551 keywords

Results
Found 3032 publication records. Showing 3032 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Cynthia Dwork, Andrew V. Goldberg, Moni Naor On Memory-Bound Functions for Fighting Spam. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Harris Drucker, Donghui Wu, Vladimir Vapnik Support vector machines for spam categorization. Search on Bibsonomy IEEE Trans. Neural Networks The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Sridhar Komandur, Daniel Mossé, Jon Crowcroft Performance Comparison of CRAM, SEAM and SPAM Multipoint VC Schemes for ATM Networks. Search on Bibsonomy ICCCN The full citation details ... 1998 DBLP  DOI  BibTeX  RDF multipoint vc, ATM multicast, vc merging, shared tree
17Andrew G. West, Sampath Kannan, Insup Lee 0001 Detecting Wikipedia vandalism via spatio-temporal analysis of revision metadata? Search on Bibsonomy EUROSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF content-based access control, spatio-temporal reputation, vandalism, Wikipedia, collaborative software
17André Bergholz AntiPhish: lessons learnt. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Jianzhong Zhang 0003, Tianyan Zhang, Xiaofeng Lan, Jingdong Xu An Aggregation-Based Raw Reputation Generation Approach. Search on Bibsonomy NAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Xin-Jing Wang, Xudong Tu, Dan Feng 0001, Lei Zhang 0001 Ranking community answers by modeling question-answer relationships via analogical reasoning. Search on Bibsonomy SIGIR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ranking, analogical reasoning, community question answering, probabilistic relational modeling
17Yitong Wang, Jingbo Chu Use noisy link analysis to improve web search. Search on Bibsonomy Hypertext The full citation details ... 2009 DBLP  DOI  BibTeX  RDF link penalty, noisy link, pagerank, link-based ranking
17Leticia I. Gómez, Alejandro A. Vaisman Efficient constraint evaluation in categorical sequential pattern mining for trajectory databases. Search on Bibsonomy EDBT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Fred Douglis On Social Networking and Communication Paradigms. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Ian Castle, Eimear Buckley The Automatic Discovery, Identification and Measurement of Botnets. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Nisheeth Shrivastava, Anirban Majumder, Rajeev Rastogi Mining (Social) Network Graphs to Detect Random Link Attacks. Search on Bibsonomy ICDE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Md. Rafiqul Islam 0001, Wanlei Zhou 0001, Morshed U. Chowdhury Email Categorization Using (2+1)-Tier Classification Algorithms. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF (2+1)-tier, Email, classifier, false positive
17Greg Aaron, Katharine A. Bostik, Rod Rasmussen, Edmon Chung Protecting the web: phishing, malware, and other security threats. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, dns
17Harald Piringer, Wolfgang Berger, Helwig Hauser Quantifying and Comparing Features in High-Dimensional Datasets. Search on Bibsonomy IV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Xu Yusheng, Zhixin Ma, Li Lian, Tharam S. Dillon Effective Pruning Strategies for Sequential Pattern Mining. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Jun Bi, Jianping Wu, Wenmao Zhang A Trust and Reputation based Anti-SPIM Method. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Yannis Soupionis, Stelios Dritsas, Dimitris Gritzalis An Adaptive Policy-Based Approach to SPIT Management. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SPIT, Policy, VoIP, Rules, Actions, Attack Graphs, Attack Trees
17Lijun Liao, Jörg Schwenk A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Anna Chmielowiec, Guillaume Pierre, Jaap Gordijn, Maarten van Steen Technical challenges in market-driven automated service provisioning. Search on Bibsonomy MW4SOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF commercial services, service bundles, service provisioning
17Eric P. Jiang Integrating Background Knowledge into RBF Networks for Text Classification. Search on Bibsonomy AIRS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF clustering, information retrieval, text classification, Radial basis function networks
17Guanggang Geng, Chunheng Wang, Qiudan Li Improving Spamdexing Detection Via a Two-Stage Classification Strategy. Search on Bibsonomy AIRS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Harald Widiger, Stephan Kubisch, Peter Danielis, Jens Schulz, Dirk Timmermann, Thomas Bahls, Daniel Duchow IPclip: An architecture to restore Trust-by-Wire in packet-switched networks. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Scott Axelrod, Vaibhava Goel, Ramesh A. Gopinath, Peder A. Olsen, Karthik Visweswariah Discriminative Estimation of Subspace Constrained Gaussian Mixture Models for Speech Recognition. Search on Bibsonomy IEEE Trans. Speech Audio Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Lijun Liao, Jörg Schwenk End-to-End Header Protection in Signed S/MIME. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Bojan Zdrnja, Nevil Brownlee, Duane Wessels Passive Monitoring of DNS Anomalies. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Xin Hu, Zhuoqing Morley Mao Accurate Real-time Identification of IP Prefix Hijacking. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Peter Haider, Ulf Brefeld, Tobias Scheffer Supervised clustering of streaming data for email batch detection. Search on Bibsonomy ICML The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Md. Rafiqul Islam 0001, Wanlei Zhou 0001 Email Categorization Using Multi-stage Classification Technique. Search on Bibsonomy PDCAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Grey list, Classification, Email, False positive
17Sujeevan Aseervatham, Aomar Osmani, Emmanuel Viennet bitSPADE: A Lattice-based Sequential Pattern Mining Algorithm Using Bitmap Representation. Search on Bibsonomy ICDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Baoning Wu, Brian D. Davison 0001 Undue influence: eliminating the impact of link plagiarism on web search rankings. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Lei Zhang 0013, Yi Zhang 0012, Yan Zhang 0004, Xiaoming Li Exploring both Content and Link Quality for Anti-Spamming. Search on Bibsonomy CIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Nathan Denny, Theodore Elhourani, Jaime Denny, Scott Bissmeyer, David Irby SpamCooker: A Method for Deterring Unsolicited Electronic Communications. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Redwan Zakariah, Samina Ehsan Detecting Junk Mails by Implementing Statistical Theory. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Keno Albrecht, Roger Wattenhofer The TROOTH Recommendation System. Search on Bibsonomy AICT/ICIW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Nicholas M. Boers, Pawel Gburzynski An Automation of Mail Channels. Search on Bibsonomy AICT/ICIW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Hector Garcia-Molina Overview of Search Engine Spamming. Search on Bibsonomy LA-WEB The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Jayashree Ravi, Weisong Shi, Cheng-Zhong Xu 0001 Personalized Email Management at Network Edges. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dynamic Web content caching, Web-based email filtering and management, network edges, prefetching
17Ning Kang 0009, Carlotta Domeniconi, Daniel Barbará Categorization and Keyword Identification of Unlabeled Documents. Search on Bibsonomy ICDM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Nobuo Kumagai, Masayoshi Aritsugi On Applying an Image Processing Technique to Detecting Spams. Search on Bibsonomy ICDE Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Andrew Kinley Acquiring Similarity Cases for Classification Problems. Search on Bibsonomy ICCBR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Ciarán Bryce, Paul Couderc, Jean-Marc Seigneur, Vinny Cahill Implementation of the SECURE Trust Engine. Search on Bibsonomy iTrust The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17M. Dolores del Castillo, Jose Ignacio Serrano An Interactive Hybrid System for Identifying and Filtering Unsolicited Email. Search on Bibsonomy Web Intelligence The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Sandeep Mane, Jaideep Srivastava, San-Yih Hwang, Jamshid A. Vayghan Estimation of False Negatives in Classification. Search on Bibsonomy ICDM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Christoph F. Eick, Nidal M. Zeidat, Zhenghong Zhao Supervised Clustering - Algorithms and Benefits. Search on Bibsonomy ICTAI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Saket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey A Policy Driven Approach to Email Services. Search on Bibsonomy POLICY The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Greg Goth Much Ado About Spamming. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Markus Müller Regulatory competition and E-Commerce. Search on Bibsonomy ICEC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF conflict of laws, internet regulation, regulatory competition, electronic commerce
17James Clark 0004, Irena Koprinska, Josiah Poon A Neural Network Based Approach to Automated E-Mail Classification. Search on Bibsonomy Web Intelligence The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Amos Fiat, Jared Saia Censorship resistant peer-to-peer content addressable networks. Search on Bibsonomy SODA The full citation details ... 2002 DBLP  BibTeX  RDF
17Peter J. M. van Laarhoven, Emile H. L. Aarts, Marc Davio PHIPLA-a new algorithm for logic minimization. Search on Bibsonomy DAC The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
12J. D. Tygar Adversarial Machine Learning. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF adversarial machine learning, spam email, machine learning, intrusion detection, computer security
12Masaru Takesue E-mail Sender Identification through Trusted Local Deposit-Agents. Search on Bibsonomy NBiS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF deposit server, trust, authorization, Spam, identification, key establishment, bot, SMTP
12Jungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao Correlation Analysis between Spamming Botnets and Malware Infected Hosts. Search on Bibsonomy SAINT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF darknet, spam, malware, honeypot, botnet, correlation analysis
12Yukiko Sawaya, Ayumu Kubota, Yutaka Miyake Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics. Search on Bibsonomy SAINT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF flow-based attacker detection, spam mail sending hosts, botnet, DDoS attack, NetFlow
12Angelos D. Keromytis Voice-over-IP Security: Research and Practice. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF SPIT, spam over Internet telephony, security, survey, VoIP, vulnerabilities, voice over IP
12Thomas Largillier, Guillaume Peyronnet, Sylvain Peyronnet SpotRank: a robust voting system for social news websites. Search on Bibsonomy WICOW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF spam demotion
12Jordan Crain, Lukasz Opyrchal, Atul Prakash 0001 Fighting Phishing with Trusted Email. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF privacy, spam, email, phishing
12Xia Hu, Fu Yan Sampling of Mass SMS Filtering Algorithm Based on Frequent Time-domain Area. Search on Bibsonomy WKDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Mass SMS filtering, frequent time-domain area, spam message, sampling algorithm
12Takumi Seike, Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura A Solution for Mail Forwarding Problem of SPF by Tracing Recipient Addresses. Search on Bibsonomy SAINT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF SPF, Sender authentication, Spam, E-mail
12Hannaneh Hajishirzi, Wen-tau Yih, Aleksander Kolcz Adaptive near-duplicate detection via similarity learning. Search on Bibsonomy SIGIR The full citation details ... 2010 DBLP  DOI  BibTeX  RDF similarity learning, near-duplicate detection, spam detection
12Taehyung Lee, Jinil Kim, Jin Wook Kim, Sung-Ryul Kim, Kunsoo Park Detecting soft errors by redirection classification. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF soft 404, url redirection, search engine, spam
12Rich Gossweiler, Maryam Kamvar, Shumeet Baluja What's up CAPTCHA?: a CAPTCHA based on image orientation. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF automated attacks, orientation detection, image processing, spam, CAPTCHA, visual processing
12Fabrício Benevenuto, Tiago Rodrigues, Virgílio A. F. Almeida, Jussara M. Almeida, Marcos André Gonçalves Detecting spammers and content promoters in online video social networks. Search on Bibsonomy SIGIR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF spammer, video promotion, video response, video spam, social networks, social media, promoter
12Michael G. Noll, Ching-man Au Yeung, Nicholas Gibbins, Christoph Meinel, Nigel Shadbolt Telling experts from spammers: expertise ranking in folksonomies. Search on Bibsonomy SIGIR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ranking, spam, folksonomy, expertise, collaborative tagging
12Taichi Katayama, Takehito Utsuro, Yuuki Sato, Takayuki Yoshinaka, Yasuhide Kawada, Tomohiro Fukuhara An empirical study on selective sampling in active learning for splog detection. Search on Bibsonomy AIRWeb The full citation details ... 2009 DBLP  DOI  BibTeX  RDF spam blog detection, SVM, active learning, selective sampling
12Weiran Xu, Dong-xin Liu, Jun Guo 0002, Yichao Cai, Rile Hu Supervised Dual-PLSA for Personalized SMS Filtering. Search on Bibsonomy AIRS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Personalized Filtering, dual-PLSA, Latent Dirichlet Allocation, Spam Filtering, Probabilistic Latent semantic Analysis
12Reshmi Maulik, Nabendu Chaki PhishNet: Enhancing the Security Aspect of IMS Users. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Vishing, SPIM, Spam, IMS, Phishing, Spoofing
12Beatrice Cynthia Dhinakaran, Jae-Kwang Lee, Dhinaharan Nagamalai "Reminder: please update your details": Phishing Trends. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF worms and trojon, spam, Phishing, virus, social engineering
12Aleksander Kolcz, Abdur Chowdhury Lexicon randomization for near-duplicate detection with I-Match. Search on Bibsonomy J. Supercomput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Information retrieval efficiency, Spam detection
12Olfa Nasraoui, Myra Spiliopoulou, Osmar R. Zaïane, Jaideep Srivastava, Bamshad Mobasher WebKDD 2008: 10 years of knowledge discovery on the web post-workshop report. Search on Bibsonomy SIGKDD Explor. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF query-log mining, communities, recommender systems, personalization, web mining, spam detection, web analytics, attack detection
12James Caverlee, Ling Liu 0001, Steve Webb Socialtrust: tamper-resilient trust establishment in online communities. Search on Bibsonomy JCDL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF social networks, trust, web 2.0, spam, deception, myspace
12Edson Kageyama, Carlos Maziero, Altair Olivo Santin An Experimental Peer-to-Peer E-mail System. Search on Bibsonomy CSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF email systems, distributed systems, peer-to-peer, spam
12Panagiotis Takis Metaxas, Lilia Ivanova, Eni Mustafaraj New Quality Metrics for Web Search Results. Search on Bibsonomy WEBIST (Selected Papers) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Recall coverage, Adversarial information retrieval, Web search, Precision, Independence, Web spam, Quality metrics
12Fred Douglis Looking Forward, Looking Back. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF spam, Internet technologies, Internet infrastructure
12Linda Dailey Paulson, George Lawton News Briefs. Search on Bibsonomy Computer The full citation details ... 2007 DBLP  DOI  BibTeX  RDF holographic display systems, open source interoperability, site-scraping robots, spam
12Francis Sullivan Is This the Party to Whom I Am Speaking? Search on Bibsonomy Comput. Sci. Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF The Last Word, Wikipedia, spam
12Paul F. Dubois Into the Future. Search on Bibsonomy Comput. Sci. Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Krugle, Source Forge, Café Dubois, spam
12Lan Nie, Baoning Wu, Brian D. Davison 0001 A cautious surfer for PageRank. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ranking performance, trust, authority, spam, web search engine
12Ian Fette, Norman M. Sadeh, Anthony Tomasic Learning to detect phishing emails. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF semantic attacks, learning, filtering, spam, email, phishing
12Ahmed Metwally 0001, Divyakant Agrawal, Amr El Abbadi Detectives: detecting coalition hit inflation attacks in advertising networks streams. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF approximate set similarity, click spam detection, cliques enumeration, coalition fraud attacks, real data experiments, similarity-sensitive sampling
12Rick Wash, Jeffrey K. MacKie-Mason Security when people matter: structuring incentives for user behavior. Search on Bibsonomy ICEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, design, spam, economics, incentives, botnets, captcha
12Olfa Nasraoui, Myra Spiliopoulou, Jaideep Srivastava, Bamshad Mobasher, Brij M. Masand WebKDD 2006: web mining and web usage analysis post-workshop report. Search on Bibsonomy SIGKDD Explor. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF peer to peer personalization, search engine query log mining, recommender systems, personalization, collaborative filtering, web mining, spam detection, web analytics, blog mining
12András A. Benczúr, István Bíró, Károly Csalogány, Máté Uher Detecting nepotistic links by language model disagreement. Search on Bibsonomy WWW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF language modeling, anchor text, link Spam
12Baoning Wu, Brian D. Davison 0001 Detecting semantic cloaking on the web. Search on Bibsonomy WWW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF spam, web search engine
12Cynthia A. Murnan Expanding communication mechanisms: they're not just e-mailing anymore. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF facebook©, gmail™, livejournal™, myspace®, skype™, internet, communication, social networking, web, wiki, PDAs, blog, spam, text-messaging, instant messaging (IM)
12Robert L. Glass Viruses Are Beginning to Get to Me! Search on Bibsonomy IEEE Softw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF software virus, spam
12Martín Abadi, Michael Burrows, Mark S. Manasse, Ted Wobber Moderately hard, memory-bound functions. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Spam
12Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann Email feedback: a policy-based approach to overcoming false positives. Search on Bibsonomy FMSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF email/spam control, policy advertisement, policy feedback, constraint logic programming
12Neal Krawetz Anti-Honeypot Technology. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF spam, honeypots, honeynets, trackers
12Robert E. Kraut, James Morris, Rahul Telang, Darrin Filer, Matt Cronin, Shyam Sunder Markets for attention: will postage for email help? Search on Bibsonomy CSCW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF empirical studies, computer mediated communication, spam, economics, markets, electronic mail, social impact
12Wyman Miles A high-availability high-performance e-mail cluster. Search on Bibsonomy SIGUCCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anti-spam, mail routing, cluster, redundancy, high-performance, proxy, high-availability, electronic mail, anti-virus, failover
12Cynthia Dwork, Ravi Kumar 0001, Moni Naor, D. Sivakumar 0001 Rank aggregation methods for the Web. Search on Bibsonomy WWW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF multi-word queries, WEB, spam, metasearch, rank aggregation, ranking functions
12V. Sri Vinitha, Dhanaraj Karthika Renuka Diverse ensemble classifier driven Email spam classification using multiple word embedding's with COCOB optimizer. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Pinnapureddy Manasa, Arun Malik, Isha Batra Detection of Twitter Spam Using GLoVe Vocabulary Features, Bidirectional LSTM and Convolution Neural Network. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Muhammad Adnan, Muhammad Osama Imam, Muhammad Furqan Javed, Iqbal Murtza Improving spam email classification accuracy using ensemble techniques: a stacking approach. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Fatna El Mendili, Mohammed Fattah, Nisrine Berros, Youness Filaly, Younès El Bouzekri El Idrissi Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Iddi S. Mambina, Jema David Ndibwile, Deo Uwimpuhwe, Kisangiri F. Michael Uncovering SMS Spam in Swahili Text Using Deep Learning Approaches. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Muhammad Salman, Muhammad Ikram 0001, Mohamed Ali Kâafar Investigating Evasive Techniques in SMS Spam Filtering: A Comparative Analysis of Machine Learning Models. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12K. Kiruthika Devi, G. A. Sathish Kumar Bio-Inspired Algorithm Based Undersampling Approach and Ensemble Learning for Twitter Spam Detection. Search on Bibsonomy Int. J. Uncertain. Fuzziness Knowl. Based Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 3032 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license