Spam filter optimality based on signal detection theory
Abstract
References
Index Terms
- Spam filter optimality based on signal detection theory
Recommendations
DNS Resource Record Analysis of URLs in E-Mail Messages for Improving Spam Filtering
SAINT '11: Proceedings of the 2011 IEEE/IPSJ International Symposium on Applications and the InternetIn recent years, spam mails intending for ``One-click fraud" or ``Phishing" have become increasing. As one anti-spam technology, DNSBL based on the URLs or their corresponding IP addresses in the messages is well used. However, some spam mails that ...
An ensemble approach applied to classify spam e-mails
Spam e-mails, known as unsolicited e-mail messages, have become an increasing problem for information security. The intrusion of spam e-mails persecute the users and waste the network resources. Traditionally, machine learning and statistical filtering ...
Filtering spam with behavioral blacklisting
CCS '07: Proceedings of the 14th ACM conference on Computer and communications securitySpam filters often use the reputation of an IP address (or IP address range) to classify email senders. This approach worked well when most spam originated from senders with fixed IP addresses, but spam today is also sent from IP addresses for which ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Atilla El�i,
- Oleg Makarevich,
- Mehmet Orgun,
- Program Chairs:
- Alexander Chefranov,
- Josef Pieprzyk,
- Yuri Anatolievich Bryukhomitsky,
- Sıddıka Berna Örs
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 237Total Downloads
- Downloads (Last 12 months)2
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in