Access the full text.
Sign up today, get DeepDyve free for 14 days.
M. Woitaszek, M. Shaaban, R. Czernikowski (2003)
Identifying junk electronic mail in Microsoft outlook with a support vector machine2003 Symposium on Applications and the Internet, 2003. Proceedings.
N. Soonthornphisaj, Kanokwan Chaikulseriwat, Piyanan Tang-On (2002)
Anti-spam filtering: a centroid-based classification approach6th International Conference on Signal Processing, 2002., 2
(2005)
Available at http://plg.uwaterloo.ca/˜ gvcormac/trecspamtrack05
Ion Androutsopoulos, G. Paliouras, E. Michelakis, E. Michelakis (2006)
Learning to Filter Unsolicited Commercial E-Mail
N. Yamai, K. Okayama, T. Miyashita, Shin Maruyama, Motonori Nakamura (2005)
A protection method against massive error mails caused by sender spoofed spam mailsThe 2005 Symposium on Applications and the Internet
Chih-Chin Lai, Ming-Chi Tsai (2004)
An empirical performance comparison of machine learning methods for spam e-mail categorizationFourth International Conference on Hybrid Intelligent Systems (HIS'04)
S. Stolfo, Shlomo Hershkop (2006)
Behavior-based email analysis with application to spam detection
B. Shneiderman (2007)
Web science: a provocative invitation to computer scienceCommun. ACM, 50
Ion Androutsopoulos, J. Koutsias, K. Chandrinos, G. Paliouras, C. Spyropoulos (2000)
An Evaluation of Naive Bayesian Anti-spam Filtering
J. Chan, I. Koprinska, Josiah Poon (2004)
Co-Training on Textual Documents with a Single Natural Feature Set
Zhe Wang, William Josephson, Qin Lv, M. Charikar, Kai Li (2007)
Filtering Image Spam with Near-Duplicate Detection
Minoru Sasaki, Hiroyuki Shinnou (2005)
Spam detection using text clustering2005 International Conference on Cyberworlds (CW'05)
William Cohen (1996)
Learning Rules that Classify E-Mail
Geoff Hulten, A. Penta, Gopalakrishnan Seshadrinathan, Manav Mishra (2004)
Trends in Spam Products and Methods
J. Golbeck, J. Hendler (2004)
Reputation Network Analysis for Email Filtering
M. Sahami, S. Dumais, D. Heckerman, E. Horvitz (1998)
A Bayesian Approach to Filtering Junk E-Mail
Patrick Pantel, Dekang Lin (1998)
SpamCop: A Spam Classification & Organisation Program
Anurag Garg, R. Battiti, Roberto Cascella (2006)
"May I borrow your filter?" Exchanging filters to combat spam in a community20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06), 2
Galen Grimes (2007)
Compliance with the CAN-SPAM Act of 2003Commun. ACM, 50
N Soonthornphisaj, Kanokwan Chaikulseriwat, P Tang-On (2002)
Anti-spam filtering: a centroid-based classification approachSignal Process, 2
H. Aradhye, G. Myers, James Herson (2005)
Image analysis for efficient categorization of image-based spam e-mailEighth International Conference on Document Analysis and Recognition (ICDAR'05)
C. Dwork, M. Naor (1992)
Pricing via Processing or Combatting Junk Mail
L Kun-Lun, L Kai, H Hou-Kuan, T Sheng-Feng (2002)
Active learning with simplified SVMs for spam categorizationMach Learn Cybern, 3
Kang Li, C. Pu, M. Ahamad (2004)
Resisting SPAM Delivery by TCP Damping
(2005)
The global economic impact of spam. report #409. Available at http://www.ferris.com/get content file.php?id=364 Accessed: 13.06
(2003)
The next step in the spam control war: Greylisting. Available at http://projects
(2004)
Project honey pot: Distributed spam harvester tracking network Available at http://www.projecthoneypot.org
D. Nagamalai, B. Dhinakaran, Jae-Kwang Lee (2007)
Multi Layer Approach to Defend DDoS Attacks Caused by Spam2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07)
Guoqing Mo, Wei Zhao, Haixia Cao, Jianshe Dong (2006)
Multi-agent Interaction Based Collaborative P2P System for Fighting Spam2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology
H. Drucker, Donghui Wu, V. Vapnik (1999)
Support vector machines for spam categorizationIEEE transactions on neural networks, 10 5
Z. Duan, Yingfei Dong, Kartik Gopalan (2005)
A Differentiated Message Delivery Architecture to Control Spam11th International Conference on Parallel and Distributed Systems (ICPADS'05), 2
I. Rigoutsos, T. Huynh (2004)
Chung-Kwei: a Pattern-discovery-based System for the Automatic Identification of Unsolicited E-mail Messages (SPAM)
Daniel Lowd, Christopher Meek (2005)
Good Word Attacks on Statistical Spam Filters
Kang Li, Zhenyu Zhong (2006)
Fast statistical spam filter by approximate classifications
E. Michelakis, Ion Androutsopoulos, G. Paliouras, Georgios Sakkis, Panagiotis Stamatopoulos (2004)
Filtron: A Learning-Based Anti-Spam Filter
Lorenzo Lazzari, M. Mari, A. Poggi (2005)
CAFE - collaborative agents for filtering e-mails14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)
W. Zhao, Zili Zhang (2005)
An email classification model based on rough set theoryProceedings of the 2005 International Conference on Active Media Technology, 2005. (AMT 2005).
G. Cormack, T. Lynam (2005)
Spam Corpus Creation for TREC
Xiao Luo, N. Zincir-Heywood (2005)
Comparison of a SOM based sequence analysis system and naive Bayesian classifier for spam filteringProceedings. 2005 IEEE International Joint Conference on Neural Networks, 2005., 4
(2003)
KDD Explorations
W. Cukier, Susan Cody, Eva Nesselroth (2006)
Genres of Spam: Expectations and DeceptionsProceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 3
Xiao-Lin Wang, I. Cloete (2005)
Learning to classify email: a survey2005 International Conference on Machine Learning and Cybernetics, 9
V. Metsis, Ion Androutsopoulos, G. Paliouras (2006)
Spam Filtering with Naive Bayes - Which Naive Bayes?
Bryan Klimt, Yiming Yang (2004)
Introducing the Enron Corpus
(2003)
Designated mailers protocol . http://www.pan-am.ca/dmp/draft-fecyk- dmp-01.txt
D. Sculley, Gabriel Wachman (2007)
Relaxed online SVMs for spam filtering
Joshua Goodman, Wen-tau Yih (2006)
Online Discriminative Spam Filter Training
Yan Zhou, M. Mulekar, Praveen Nerellapalli (2005)
Adaptive spam filtering using dynamic feature space17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'05)
Matthew Prince, Benjamin Dahl, L. Holloway, A. Keller, Eric Langheinrich (2005)
Understanding How Spammers Steal Your E-Mail Address: An Analysis of the First Six Months of Data from Project Honey Pot
X. Carreras, Lluís Villodre (2001)
Boosting Trees for Anti-Spam Email FilteringArXiv, cs.CL/0109015
(2002)
A plan for spam
(2005)
ITU survey on anti-spam legislation worldwide Available at http://www.itu.int/osg/spu/spam
Aaron Zinman, J. Donath (2007)
Is Britney Spears Spam?
P. Boykin, V. Roychowdhury (2005)
Leveraging social networks to fight spamComputer, 38
Takamichi Saito (2005)
Anti-SPAM System: Another Way of Preventing SPAM16th International Workshop on Database and Expert Systems Applications (DEXA'05)
Jaeyeon Jung, Emil Sit (2004)
An empirical study of spam traffic and the use of DNS black lists
C. Yeh, Chili-Hung Wu, Shine-Hwang Doong (2005)
Effective spam classification based on meta-heuristics2005 IEEE International Conference on Systems, Man and Cybernetics, 4
E. Blanzieri, Anton Bryl (2007)
Evaluation of the Highest Probability SVM Nearest Neighbor Classifier with Variable Relative Error Cost
Tom Fawcett (2003)
"In vivo" spam filtering: a challenge problem for KDDSIGKDD Explor., 5
Mark Dredze, Reuven Gevaryahu, Ari Elias-Bachrach (2007)
Learning Fast Classifiers for Image Spam
Tom Fawcett (2004)
"In vivo" spam filtering: A challenge problem for data miningArXiv, cs.AI/0405007
(2001)
Spam defined. http://www.monkeys.com/spam-defined
Ion Androutsopoulos, J. Koutsias, K. Chandrinos, C. Spyropoulos (2000)
An experimental comparison of naive Bayesian and keyword-based anti-spam filtering with personal e-mail messages
Ben Medlock (2006)
An Adaptive, Semi-Structured Language Model Approach to Spam Filtering on a New Corpus
Ching-Tung Wu, K. Cheng, Qiang Zhu, Yi-Leh Wu (2005)
Using visual features for anti-spam filteringIEEE International Conference on Image Processing 2005, 3
G. Cormack (2006)
TREC 2006 Spam Track Overview
M. Siponen, Carl Stucke (2006)
Effective Anti-Spam Strategies in Companies: An International StudyProceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 6
T. Joachims (1997)
A Probabilistic Analysis of the Rocchio Algorithm with TFIDF for Text Categorization
B. Leiba, Joel Ossher, V. Rajan, Richard Segal, M. Wegman (2005)
SMTP Path Analysis
C. O'Brien, Carl Vogel (2003)
Spam filters: bayes vs. chi-squared; letters vs. words
Kun-Lun Li, Kai Li, Houkuan Huang, S. Tian (2002)
Active learning with simplified SVMs for spam categorizationProceedings. International Conference on Machine Learning and Cybernetics, 3
C. Pu, Steve Webb (2006)
Observed Trends in Spam Construction Techniques: A Case Study of Spam Evolution
(2004)
Lightweight MTA authentication protocol (LMAP) discussion and comparison. http://www.taugh.com/draft- irtf-asrg-lmap-discussion-01
Joshua Goodman (2004)
IP Addresses in Email Clients
(2004)
Georgios Paliouras, George Sakkis, and Panagiotis Stamatopoulos. Filtron: A learning-based antispam filter
Dan Twining, Matthew Williamson, Miranda Mowbray, M. Rahmouni (2004)
Email Prioritization: Reducing Delays on Legitimate Mail Caused by Junk Mail
Wen-tau Yih, Joshua Goodman, Geoff Hulten (2006)
Learning at Low False Positive Rates
So Park, Jeong-Tae Kim, Shin-Gak Kang (2006)
Analysis of applicability of traditional spam regulations to VoIP spam2006 8th International Conference Advanced Communication Technology, 2
V. Zorkadis, M. Panayotou, Dimitrios Karras (2005)
Improved spam e-mail filtering based on committee machines and information theoretic feature extractionProceedings. 2005 IEEE International Joint Conference on Neural Networks, 2005., 1
(2003)
Should senders pay for the mess we call e-mail? eWeek, http://www.eweek.com/article2
E. Moustakas, C. Ranganathan, P. Duquenoy (2005)
Combating Spam through Legislation: A Comparative Analysis of US and European Approaches
C. Zhan, Xianliang Lu, Meng-shu Hou, Xu Zhou (2005)
A LVQ-based neural network anti-spam email approachACM SIGOPS Oper. Syst. Rev., 39
(2003)
Better bayesian filtering
Christine Drake, Jonathan Oliver, Eugene Koontz (2004)
Anatomy of a Phishing Email
Georgios Sakkis, Ion Androutsopoulos, G. Paliouras, V. Karkaletsis, C. Spyropoulos, Panagiotis Stamatopoulos (2004)
A Memory-Based Approach to Anti-Spam Filtering for Mailing ListsInformation Retrieval, 6
E. Damiani, S. Vimercati, S. Paraboschi, P. Samarati (2004)
P2P-based collaborative spam detection and filteringProceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings.
Ion Androutsopoulos, J. Koutsias, K. Chandrinos, G. Paliouras, C. Spyropoulos (2000)
An evaluation of Naive Bayesian anti-spam filteringArXiv, cs.CL/0006013
(2006)
Messaging anti-abuse working group Email metrics repost. Third & fourth quarter 2006
Joshua Goodman, G. Cormack, D. Heckerman (2007)
Spam and the ongoing battle for the inboxCommun. ACM, 50
Georgios Sakkis, Ion Androutsopoulos, G. Paliouras, V. Karkaletsis, C. Spyropoulos, Panagiotis Stamatopoulos (2001)
Stacking Classifiers for Anti-Spam Filtering of E-MailArXiv, cs.CL/0106040
N. Lugaresi (2004)
European Union vs. Spam: A Legal Response
G. Cormack, Andrej Bratko (2006)
Batch and Online Spam Filter Comparison
Ion Androutsopoulos, Evangelos Magirou, Dimitrios Vassilakis (2005)
A Game Theoretic Model of Spam E-Mailing
G. Fumera, I. Pillai, F. Roli (2006)
Spam Filtering Based On The Analysis Of Text Information Embedded Into ImagesJ. Mach. Learn. Res., 7
F. Zhou, Zhuang Li, Ben Zhao, Ling Huang, A. Joseph, J. Kubiatowicz (2003)
Approximate Object Location and Spam Filtering on Peer-to-Peer Systems
K. Albrecht, N. Burri, Roger Wattenhofer (2005)
Spamato - An Extendable Spam Filter System
Honglak Lee, A. Ng (2005)
Spam Deobfuscation using a Hidden Markov Model
Joshua Goodman, Robert Rounthwaite (2004)
Stopping outgoing spam
B. Kuipers, A. Liu, Aashin Gautam, M. Gouda (2005)
Zmail: zero-sum free market control of spam25th IEEE International Conference on Distributed Computing Systems Workshops
Le Zhang, Jingbo Zhu, T. Yao (2004)
An evaluation of statistical spam filtering techniquesACM Trans. Asian Lang. Inf. Process., 3
(2005)
The definition of spam Available at http://www.spamhaus.org/definition.html
Anirudh Ramachandran, N. Feamster (2006)
Understanding the network-level behavior of spammersProceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
(2003)
Trusted e-mail open stan- dard: A comprehencive policy and technology proposal for email reform
L. Gomes, Cristiano Cazita, J. Almeida, Virgílio Almeida, Wagner Jr (2004)
Characterizing a spam traffic
Andrej Bratko, G. Cormack, B. Filipič, T. Lynam, B. Zupan (2006)
Spam Filtering Using Statistical Data Compression ModelsJ. Mach. Learn. Res., 7
(2005)
The CAPTCHA project
Gregory Wittel, S. Wu (2004)
On Attacking Statistical Spam Filters
B. Agrawal, Nitin Kumar, M. Molle (2005)
Controlling spam Emails at the routersIEEE International Conference on Communications, 2005. ICC 2005. 2005, 3
Le Zhang, T. Yao (2003)
Filtering Junk Mail with a Maximum Entropy Model
Ion Androutsopoulos, G. Paliouras, V. Karkaletsis, Georgios Sakkis, C. Spyropoulos, Panagiotis Stamatopoulos (2000)
Learning to Filter Spam E-Mail: A Comparison of a Naive Bayesian and a Memory-Based ApproachArXiv, cs.CL/0009009
Ben Medlock (2005)
An Adaptive Approach to Spam Filtering on a New Corpus
(2004)
Sender ID technology: Information for IT professionals Available at http://www.microsoft.com/mscorp/safety/ technologies/senderid/technology
(2004)
USA. pp 356–369. ISBN 1-58113-821-0
P. Chirita, J. Diederich, W. Nejdl (2005)
MailRank: using ranking for spam detection
(2004)
DeKok A (2004) Lightweight MTA authentication protocol (LMAP) discussion and comparison
Email spam is one of the major problems of the today’s Internet, bringing financial damage to companies and annoying individual users. Among the approaches developed to stop spam, filtering is an important and popular one. In this paper we give an overview of the state of the art of machine learning applications for spam filtering, and of the ways of evaluation and comparison of different filtering methods. We also provide a brief description of other branches of anti-spam protection and discuss the use of various approaches in commercial and non-commercial anti-spam software solutions.
Artificial Intelligence Review – Springer Journals
Published: Jul 10, 2009
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.