55
Views
4
CrossRef citations to date
0
Altmetric
Spam Detection

Spam Detection: Increasing Accuracy with A Hybrid Solution

&

References

  • Androutsopoulos , I. , Koutsias , J. , Chandrinos , K. and Spyropoulos , D. 2000 . “ An Experimental Comparison of Naive Bayesian and Keyword-based Anti-spam Filtering with Personal E-mail Messages ” . In Proceedings of the 23rd ACM SIGIR Annual Conference 160 – 167 . Athens, Greece July
  • Carreras , X. and Màrquez , L. 2001 . “ Boosting Trees for Anti-spam E-mail Filtering ” . In Proceedings of the 4th International Conference on Recent Advances in Natural Language Processing (RANLP) , 58 – 64 . Bulgaria : Tzigov Chark . September
  • CEAS . 2004 . Proceedings of Conference on E-mail and Anti-Spam (CEAS) 30 – 31 . Mountain View, CA July
  • CEAS . 2005 . Proceedings of Conference on E-mail and Anti-Spam (CEAS) , 21 – 22 . CA : Stanford University . July
  • Cohen , W. March 25–27 1996 . “ Learning Rules That Classify E-mails ” . In Proceedings of the AAAI Spring Symposium on Machine Learning in Information Access , March 25–27 , 18 – 25 . CA : Stanford University .
  • Cournane , A. and Hunt , R. 2004 . An Analysis of the Tools Used for the Generation and Prevention of Spam . IEEE Computers & Security , 23 ( March ) : 2 154 – 166 .
  • Cranor , I. and La Macchia , B. 1998 . Spam! Communications of the ACM , 41 ( August ) : 11 74 – 84 .
  • Delany , M. 2005 . Domain-based E-mail Authentication Using Public-Keys Advertised in the DNS (DomainKeys) . Internet Draft , draft-delany-domainkeys-base-02.txt, March. http://www.ietf.org/internet-drafts/draft-delany-domainkeys-base-02.txt
  • Denning , P. 1982 . Electronic Junk . Communications of the ACM , 25 ( March ) : 3 163 – 165 .
  • Emigh , J. 2003 . Stomping Out Spam: The Spam Series, Part 1. . EarthWeb , http://networking.earthweb.com/netsysm/article. php/2107121 Federal Trade Commission (FTC)'s Report (2003). False Claims in Spam. April. http://www.ftc.gov/reports/spam/030429spamreport.pdf
  • Gburzynski , P. and Maitan , J. 2004 . Fighting the Spam Wars: A Re-mailer Approach with Restrictive Aliasing . ACM Transactions on Internet Technology (TOIT) , 4 ( February ) : 1 1 – 30 .
  • Hidalgo , J. , Opez , M. and Sanz , E. 2000 . “ Combining Text and Heuristics for Cost-sensitive Spam Filtering ” . In Proceedings of the 4th Computational Natural Language Learning Workshop (CoNLL) 99 – 102 . Lisbon, Portugal September 13–14
  • Neumann , P. and Weinstein , L. 1997 . Inside Risks: Spam, Spam, Spam! Communications of the ACM , 40 ( June ) : 6 112
  • Nucleus Research . 2003 . Spam: The Silent ROI Killer . Research Note , D59 http://www.nucleusresearch.com/research/d59.pdf
  • Pantel , P. and Lin , D. 1998 . “ SpamCop - A Spam Classification & Organization Program ” . In Proceedings of the AAAI Workshop on Learning for Text Categorization 95 – 98 . Madison, Wisconsin July 26–27
  • Rennie , J. , Shih , L. , Teevan , J. and Karger , D. 2003 . “ Tackling the Poor Assumptions of Naive Bayes Text Classifiers ” . In Proceedings of the 20th International Conference on Machine Learning (ICML-2003) 616 – 623 . Washington, DC August 21–24
  • Sahami , M. , Dumais , S. , Heckerman , D. and Horovitz , E. 1998 . “ A Bayesian Approach to Filtering Junk E-mail ” . In Proceedings of the AAAI Workshop on Learning for Text Categorization , 55 – 62 . Wisconsin : Madison . July 26–27
  • Sakkis , G. , Androutsopoulos , I. , Paliouras , G. , Karkaletsis , V. , Spyropoulos , C. and Stamatopoulos , P. 2001 . Proceedings of the 6th Conference on Empirical Methods in Natural Language Processing (EMNLP) , 44 – 50 . Pittsburgh, Pennsylvania : Carnegie Mellon University . Stacking Classifiers for Anti-spam Filtering of E-mail, June 3–4
  • Schneider , K. 2003 . “ A Comparison of Event Models for Naive Bayes Anti-spam E-mail Filtering ” . In Proceedings of the10th Conference of the European Chapter of the Association for Computational Linguistics (EACL) 307 – 314 . Budapest, Hungary April 12–17
  • Taughannock Networks . 2004 . An Overview of E-postage , February 2004. http://www.taugh.com/epostage.pdf

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.