A comprehensive survey for intelligent spam email detection

A Karim, S Azam, B Shanmugam, K Kannoorpatti… - Ieee …, 2019 - ieeexplore.ieee.org
The tremendously growing problem of phishing e-mail, also known as spam including spear
phishing or spam borne malware, has demanded a need for reliable intelligent anti-spam e …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

A survey of emerging approaches to spam filtering

G Caruana, M Li - ACM computing surveys (CSUR), 2008 - dl.acm.org
From just an annoying characteristic of the electronic mail epoch, spam has evolved into an
expensive resource and time-consuming problem. In this survey, we focus on emerging …

Aiding the detection of fake accounts in large scale social online services

Q Cao, M Sirivianos, X Yang, T Pregueiro - 9th USENIX symposium on …, 2012 - usenix.org
Users increasingly rely on the trustworthiness of the information exposed on Online Social
Networks (OSNs). In addition, OSN providers base their business models on the …

Design and evaluation of a real-time url spam filtering service

K Thomas, C Grier, J Ma, V Paxson… - 2011 IEEE symposium …, 2011 - ieeexplore.ieee.org
On the heels of the widespread adoption of web services such as social networks and URL
shorteners, scams, phishing, and malware have become regular threats. Despite extensive …

Suspended accounts in retrospect: an analysis of twitter spam

K Thomas, C Grier, D Song, V Paxson - Proceedings of the 2011 ACM …, 2011 - dl.acm.org
In this study, we examine the abuse of online social networks at the hands of spammers
through the lens of the tools, techniques, and support infrastructure they rely upon. To …

BotSniffer: Detecting botnet command and control channels in network traffic

G Gu, J Zhang, W Lee - 2008 - corescholar.libraries.wright.edu
Botnets are now recognized as one of the most serious security threats. In contrast to
previous malware, botnets have the characteristic of a command and control (C&C) channel …

Antidote: understanding and defending against poisoning of anomaly detectors

BIP Rubinstein, B Nelson, L Huang… - Proceedings of the 9th …, 2009 - dl.acm.org
Statistical machine learning techniques have recently garnered increased popularity as a
means to improve network design and security. For intrusion detection, such methods build …

[图书][B] Exploring digital communication: Language in action

C Tagg - 2015 - taylorfrancis.com
Routledge Introductions to Applied Linguistics is a series of introductory level textbooks
covering the core topics in Applied Linguistics, primarily designed for those beginning …

Detecting spam in a twitter network

S Yardi, D Romero, G Schoenebeck - First monday, 2010 - firstmonday.org
Spam becomes a problem as soon as an online communication medium becomes popular.
Twitter's behavioral and structural properties make it a fertile breeding ground for spammers …