Email spam filtering: A systematic review
GV Cormack - Foundations and Trends® in Information …, 2008 - nowpublishers.com
Spam is information crafted to be delivered to a large number of recipients, in spite of their
wishes. A spam filter is an automated tool to recognize spam so as to prevent its delivery …
wishes. A spam filter is an automated tool to recognize spam so as to prevent its delivery …
A survey of learning-based techniques of email spam filtering
E Blanzieri, A Bryl - Artificial Intelligence Review, 2008 - Springer
Email spam is one of the major problems of the today's Internet, bringing financial damage to
companies and annoying individual users. Among the approaches developed to stop spam …
companies and annoying individual users. Among the approaches developed to stop spam …
Cryptoeconomics and Tokenomics as Economics: A Survey with Opinions
K Ito - arXiv preprint arXiv:2407.15715, 2024 - arxiv.org
This paper surveys products and studies on cryptoeconomics and tokenomics from an
economic perspective, as these terms are still (i) ill-defined and (ii) disconnected from …
economic perspective, as these terms are still (i) ill-defined and (ii) disconnected from …
Feature cross-substitution in adversarial classification
B Li, Y Vorobeychik - Advances in neural information …, 2014 - proceedings.neurips.cc
The success of machine learning, particularly in supervised settings, has led to numerous
attempts to apply it in adversarial settings such as spam and malware detection. The core …
attempts to apply it in adversarial settings such as spam and malware detection. The core …
Toward a sustainable email marketing infrastructure
OV Pavlov, N Melville, RK Plice - Journal of Business Research, 2008 - Elsevier
Email marketing is a legitimate, lucrative, and widely used business tool that is in danger of
being overrun by unwanted commercial email (also known as spam). Conventional …
being overrun by unwanted commercial email (also known as spam). Conventional …
Classifier evaluation and attribute selection against active adversaries
Many data mining applications, such as spam filtering and intrusion detection, are faced with
active adversaries. In all these applications, the future data sets and the training data set are …
active adversaries. In all these applications, the future data sets and the training data set are …
Evasion-robust classification on binary domains
B Li, Y Vorobeychik - ACM Transactions on Knowledge Discovery from …, 2018 - dl.acm.org
The success of classification learning has led to numerous attempts to apply it in adversarial
settings such as spam and malware detection. The core challenge in this class of …
settings such as spam and malware detection. The core challenge in this class of …
Agent‐based literacy theory
JE McEneaney - Reading Research Quarterly, 2006 - Wiley Online Library
ABSTRACTS The purpose of this theoretical essay is to explore the limits of traditional
conceptualizations of reader and text and to propose a more general theory based on the …
conceptualizations of reader and text and to propose a more general theory based on the …
Efficient defense strategy against spam and phishing email: An evolutionary game model
M Wang, L Song - Journal of Information Security and Applications, 2021 - Elsevier
Spam and phishing emails are never-ending problems, and they are increasingly distributed
with the help of the botnet. Existing spam and phishing email defense depends heavily on …
with the help of the botnet. Existing spam and phishing email defense depends heavily on …
A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication
Y Soupionis, RA Koutsiamanis… - Journal of …, 2014 - content.iospress.com
Abstract Spam over Internet Telephony (SPIT) is a potential source of disruption in Voice
over IP (VoIP) systems. The use of anti-SPIT mechanisms, such as filters and audio …
over IP (VoIP) systems. The use of anti-SPIT mechanisms, such as filters and audio …