A Case Study of User-Level Spam Filtering
@inproceedings{Bajaj2014ACS, title={A Case Study of User-Level Spam Filtering}, author={Kamini Bajaj and J. Pieprzyk}, booktitle={AISC}, year={2014} }
There are number of Anti-Spam filters that have reduced the amount of email spam in the inbox but the problem still continues as the spammers circumvent these techniques. The problems need to be addressed from different aspects. Major problem for instance arises when these anti-spam techniques misjudge or misclassify legitimate emails as spam (false positive); or fail to deliver or block spam on the SMTP server (false negative); thus causing a staggering cost in loss of time, effort and finance… Expand
5 Citations
References
SHOWING 1-10 OF 73 REFERENCES
Effective Anti-Spam Strategies in Companies: An International Study
- Business, Computer Science
- Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)
- 2006
- 57
- PDF
An Empirical Study of Spam and Spam Vulnerable email Accounts
- Computer Science
- Future Generation Communication and Networking (FGCN 2007)
- 2007
- 20
- PDF
Spam filtering using spam mail communities
- Computer Science
- The 2005 Symposium on Applications and the Internet
- 2005
- 15
- PDF
A survey of learning-based techniques of email spam filtering
- Computer Science
- Artificial Intelligence Review
- 2009
- 370
- PDF
Spam filtering: Comparative analysis of filtering techniques
- Engineering
- IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012)
- 2012
- 7
An empirical study of three machine learning methods for spam filtering
- Computer Science
- Knowl. Based Syst.
- 2007
- 71
- PDF
Architecture of Adaptive Spam Filtering Based on Machine Learning Algorithms
- Computer Science
- ICA3PP
- 2007
- 20
Filtering spam e-mail with Generalized Additive Neural Networks
- Computer Science
- 2012 Information Security for South Africa
- 2012
- 7
- PDF
Miracle cures and toner cartridges:finding solutions to the spam problem
- Computer Science
- 19th Annual Computer Security Applications Conference, 2003. Proceedings.
- 2003
- 8
- PDF