Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,463 papers from all fields of science
Search
Sign In
Create Free Account
Email filtering
Known as:
Spamfilter
, Mail filter
, Bozo
Expand
Email filtering is the processing of email to organize it according to specified criteria. Most often this refers to the automatic processing of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Anti-spam techniques
Bag-of-words model
Bounce message
CRM114 (program)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Wirebrush4SPAM: a novel framework for improving efficiency on spam filtering services
Noemí Pérez-Díaz
,
David Ruano-Ordás
,
F. F. Riverola
,
J. R. Méndez
Software, Practice & Experience
2013
Corpus ID: 8707903
This paper introduces Wirebrush4SPAM, a plug‐in‐based C framework specifically designed for the development of fast spam filters…
Expand
2013
2013
Transmission network investment with probabilistic security and corrective control
R. Moreno
,
D. Pudjianto
,
G. Strbac
IEEE PES General Meeting | Conference…
2013
Corpus ID: 23250502
Summary form only given. This paper demonstrates that the growth in application of corrective actions to enhance network…
Expand
Highly Cited
2011
Highly Cited
2011
A Local-Concentration-Based Feature Extraction Approach for Spam Filtering
Y. Zhu
,
Ying Tan
IEEE Transactions on Information Forensics and…
2011
Corpus ID: 15942432
Inspired from the biological immune system, we propose a local concentration (LC)-based feature extraction approach for anti-spam…
Expand
2009
2009
The Contribution of Stylistic Information to Content-based Mobile Spam Filtering
Dae-Neung Sohn
,
Jung-Tae Lee
,
Hae-Chang Rim
Annual Meeting of the Association for…
2009
Corpus ID: 192516
Content-based approaches to detecting mobile spam to date have focused mainly on analyzing the topical aspect of a SMS message…
Expand
Highly Cited
2008
Highly Cited
2008
B-APT: Bayesian Anti-Phishing Toolbar
Peter Likarish
,
Eunjin Jung
,
Donald E. Dunbar
,
Thomas E. Hansen
,
J. Hourcade
IEEE International Conference on Communications
2008
Corpus ID: 2557287
Identity theft is one of the fastest growing crimes in the nation, and phishing has been a primary tool used for this type of…
Expand
2008
2008
High-speed string searching against large dictionaries on the Cell/B.E. Processor
D. Scarpazza
,
Oreste Villa
,
F. Petrini
IEEE International Symposium on Parallel and…
2008
Corpus ID: 919896
Our digital universe is growing, creating exploding amounts of data which need to be searched, filtered and protected. String…
Expand
Highly Cited
2007
Highly Cited
2007
Workload models of spam and legitimate e-mails
L. H. Gomes
,
Cristiano Cazita
,
J. Almeida
,
Virgílio A. F. Almeida
,
Wagner Meira Jr
Performance evaluation (Print)
2007
Corpus ID: 9370320
2007
2007
Exchange Rate Volatility, Macro Announcements and the Choice of Intraday Seasonality Filtering Method
Helinä Laakkonen
2007
Corpus ID: 18288878
Filtering intraday seasonality in volatility is crucial for using high frequency data in econometric analysis. This paper studies…
Expand
Highly Cited
2006
Highly Cited
2006
On-line spam filter fusion
T. Lynam
,
G. Cormack
,
D. Cheriton
Annual International ACM SIGIR Conference on…
2006
Corpus ID: 13548046
We show that a set of independently developed spam filters may be combined in simple ways to provide substantially better…
Expand
2005
2005
SIP Service Providers and The Spam Problem
Y. Rebahi
,
D. Sisalem
2005
Corpus ID: 17457194
The Session Initiation Protocol (SIP) is used for managing multimedia sessions in the Internet. As an emerging standard gaining…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE