The SCEAS System
Navigation Menu

Conferences in DBLP

(ceas)
2004 (conf/ceas/2004)

  1. Shabbir Ahmed, Farzana Mithun
    Word Stemming to Enhance Spam Filtering. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  2. Aleksander Kolcz, Abdur Chowdhury, Joshua Alspector
    The Impact of Feature Selection on Signature-Driven Spam Detection. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  3. Barry Leiba, Nathaniel S. Borenstein
    A Multifaceted Approach to Spam Reduction. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  4. Matt Leonard, Mayra Rodriguez, Richard Segal, Robert Shoop
    Managing Customer Opt-Outs in a Complex Global Environment. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  5. Kang Li, Calton Pu, Mustaque Ahamad
    Resisting SPAM Delivery by TCP Damping. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  6. Nicola Lugaresi
    European Union vs. Spam: A Legal Response. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  7. Tony A. Meyer, Brendon Whateley
    SpamBayes: Effective open-source, Bayesian based, email classification system. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  8. Eirinaios Michelakis, Ion Androutsopoulos, Georgios Paliouras, Georgios Sakkis, Panagiotis Stamatopoulos
    Filtron: A Learning-Based Anti-Spam Filter. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  9. Matthew Prince, Arthur M. Keller, Benjamin M. Dahl
    No-Email-Collection Flag. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  10. Isidore Rigoutsos, Tien Huynh
    Chung-Kwei: a Pattern-discovery-based System for the Automatic Identification of Unsolicited E-mail Messages (SPAM). [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  11. Gordon Rios, Hongyuan Zha
    Exploring Support Vector Machines and Random Forests for Spam Detection. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  12. Richard Segal, Jason Crawford, Jeffrey O. Kephart, Barry Leiba
    SpamGuru: An Enterprise Anti-Spam Filtering System. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  13. Brett Watson
    Beyond Identity: Addressing Problems that Persist in an Electronic Mail System with Reliable Sender Identification. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  14. Bryan Klimt, Yiming Yang
    Introducing the Enron Corpus. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  15. Geoff Hulten, Anthony Penta, Gopalakrishnan Seshadrinathan, Manav Mishra
    Trends in Spam Products and Methods. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  16. Yifen Huang, Dinesh Govindaraju, Tom M. Mitchell, Vitor Rocha de Carvalho, William W. Cohen
    Inferring Ongoing Activities of Workstation Users by Clustering Email. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  17. Paula Bruening
    Technological Responses to the Problem of Spam: Preserving Free Speech and Open Internet Values . [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  18. Vitor Rocha de Carvalho, William W. Cohen
    Learning to Extract Signature and Reply Lines from Email. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  19. Richard Clayton
    Stopping Spam by Extrusion Detection. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  20. Simon Corston-Oliver, Eric K. Ringger, Michael Gamon, Richard Campbell
    Integration of Email and Task Lists. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  21. Aron Culotta, Ron Bekkerman, Andrew McCallum
    Extracting social networks and contact information from email and the Web. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  22. Rui Dai, Kang Li
    Shall We Stop All Unsolicited Email Messages? [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  23. Christine E. Drake, Jonathan J. Oliver, Eugene J. Koontz
    Anatomy of a Phishing Email. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  24. Deborah Fallows
    Internet Users and Spam: What the attitudes and behavior of Internet users can tell us about fighting spam. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  25. Jennifer Golbeck, James A. Hendler
    Reputation Network Analysis for Email Filtering. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  26. Joshua Goodman
    IP Addresses in Email Clients. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  27. Alan Gray, Mads Haahr
    Personalised, Collaborative Spam Filtering. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  28. Benjamin M. Gross
    Multiple Email Addresses: A Socio-technical Investigation. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  29. Gregory L. Wittel, Shyhtsun Felix Wu
    On Attacking Statistical Spam Filters. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002