Filters








2,444 Hits in 3.8 sec

Worse Than Spam

Sebastian Baltes, Stephan Diehl
2016 Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement - ESEM '16  
As drawing a random sample of professional software developers for a survey is rarely possible, researchers rely on various sampling strategies.  ...  Objective: In this paper, we report on our experience with different sampling strategies we employed, highlight ethical issues, and motivate the need to maintain a collection of key demographics about  ...  You might not realize this but it's majorly annoying and I consider this problem now worse than spam, since Google at least filters out spam for me. [...] [Y]ou send one, I get one per week -or more.  ... 
doi:10.1145/2961111.2962628 dblp:conf/esem/Baltes016 fatcat:5pfxpw27hbhf5f2kh46ru3orxa

Incremental Learning for Spam Detection

Amin Shams, Touraj Banirostam
2017 IJARCCE  
Therefore, the goal of current research is to survey all kinds of spams and the issues they cause.  ...  Also experiments indicate that proposed algorithm is successful in detecting new input samples through introducing new classes.  ...  Spam, due to experts, internet practitioners, and professionals in this area is more an ethical issue.  ... 
doi:10.17148/ijarcce.2017.6101 fatcat:bvnr7kxbzra4jjvfqj6itbkclq

SURVEY ON REVIEW SPAM DETECTION

SNEHAL DIXIT, A.J. AGRAWAL
2016 International journal of computer and communication technology  
This paper previews and reviews the substantial research on Review Spam detection technique. Further it provides state of art depicting some previous attempt to study review spam detection.  ...  The proliferation of E-commerce sites has made web an excellent source of gathering customer reviews about products; as there is no quality control anyone one can write anything which leads to review spam  ...  Evaluation Method Review spam detection software is used to facilitate manual evaluation.  ... 
doi:10.47893/ijcct.2016.1332 fatcat:iqftdn5myffeflr2i4gje6nd4a

Penetration Testing for Spam Filters

Yugesh Madhavan, João W. Cangussu, Ram Dantu
2009 2009 33rd Annual IEEE International Computer Software and Applications Conference  
Despite all the advances on techniques to block spam e-mail messages we still receive them on a frequent basis.  ...  An approach based on Natural Language Processing (NLP) for the penetration of spam filters is proposed here.  ...  Conclusions and Future Work As most security issues, spam detection is not a easy problem to solve.  ... 
doi:10.1109/compsac.2009.168 dblp:conf/compsac/MadhavanCD09 fatcat:nofhw5o46rgjvmfhjuudz7dgmq

Prevalence and mitigation of forum spamming

Youngsang Shin, Minaxi Gupta, Steven Myers
2011 2011 Proceedings IEEE INFOCOM  
In this paper, we study the prevalence of forum spamming and find that Internet users are at a high risk of encountering forums with spam links posted on them.  ...  Forums on the Web are increasingly spammed by miscreants in order to attract visitors to their (often malicious) websites.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the NSF.  ... 
doi:10.1109/infcom.2011.5935048 dblp:conf/infocom/ShinGM11 fatcat:uul23lnkkfeshc67wl56vpebna

SMS spam filtering: Methods and data

Sarah Jane Delany, Mark Buckley, Derek Greene
2012 Expert systems with applications  
This paper motivates work on filtering SMS spam and reviews recent developments in SMS spam filtering.  ...  The paper also discusses the issues with data collection and availability for furthering research in this area, analyses a large corpus of SMS spam, and provides some initial benchmark results.  ...  In addition the issue of handling concept drift, the constant change in spam in order to bypass filters, is also a key challenge.  ... 
doi:10.1016/j.eswa.2012.02.053 fatcat:onkgyhoe45h3pi2bthtwlnc7ya

Identification of Factors Affecting Spamming A Survey based Approach

Laxmi Ahuja, Ela Kumar
2012 International Journal of Computer Applications  
The process of reducing spam has become much more difficult than before and this is because more than 85% of all email receive today constitutes as spam the large quantity of unsolicited email has also  ...  become a huge problem for IT relations in several universities.  ...  The questionnaire has been developed to examine the views of search engine spamming techniques in technical educational institution in India.  ... 
doi:10.5120/6071-8258 fatcat:krpymjnsmbgqzganmy4o6jyd4a

Spam Filter based on Dynamic Sender Policy Framework

Tuan-Anh Nguyen, Quang-Anh Tran, Xuan-Thang Nguyen
2010 Proceedings of the Asia-Pacific Advanced Network  
A philosophic issue, which may limit the deployment of SPF, is that in order to use SPF, a network administrator needs to configure local DNS; but others, not himself, will take benefits from that configuration  ...  Results showed that the system is able to filter 98% spam and 100% phishing. Collecting and updating processes of the database are described.  ...  Based on our spam/ham set, statistical figures show that 99% of spam servers use one domain name to send spam in the period of less than 5 days.  ... 
doi:10.7125/apan.30.1 fatcat:2e5lppuhxja3bcyxqssgf6h2m4

Spam Filter Based on Dynamic Sender Policy Framework

Nguyen Tuan Anh, Tran Quang Anh, Nguyen Xuen Thang
2010 2010 Second International Conference on Knowledge and Systems Engineering  
A philosophic issue, which may limit the deployment of SPF, is that in order to use SPF, a network administrator needs to configure local DNS; but others, not himself, will take benefits from that configuration  ...  Results showed that the system is able to filter 98% spam and 100% phishing. Collecting and updating processes of the database are described.  ...  Based on our spam/ham set, statistical figures show that 99% of spam servers use one domain name to send spam in the period of less than 5 days.  ... 
doi:10.1109/kse.2010.11 fatcat:onrhbkhhtbhcjjq6skir5zpsku

An evaluation of statistical spam filtering techniques

Le Zhang, Jingbo Zhu, Tianshun Yao
2004 ACM Transactions on Asian Language Information Processing  
The experiments also suggest that aggressive feature pruning should be avoided when building filters to be used in applications where legitimate mails are assigned a cost much higher than spams (such as  ...  This paper evaluates five supervised learning methods in the context of statistical spam filtering.  ...  Acknowledgments The authors are grateful to two anonymous reviewers whose thoughtful comments improved the quality of this paper, especially the use of TCR measure in evaluation.  ... 
doi:10.1145/1039621.1039625 fatcat:nhn7zowx5rgcrmmxja5hdpkfxy

Email Spam Filtering: A Systematic Review

Gordon V. Cormack
2008 Foundations and Trends in Information Retrieval  
Yet, current spam filters are remarkably effective, more effective than might be expected given the level of uncertainty and debate over a formal definition of spam, more effective than might be expected  ...  Our primary focus is spam filtering in email; Similarities and differences with spam filtering in other communication and storage media -such as instant messaging and the Web -are addressed peripherally  ...  These results, shown in Table 5 .2, are substantially worse than those achieved on the collected messages.  ... 
doi:10.1561/1500000006 fatcat:rdmysuohjbd5de54ktguwsoqum

The Effect of SPAM Administration During a Dynamic Simulation

Russell S. Pierce
2012 Human Factors  
Method: Following from the methods of Durso, Bleckley, and Dattel (2006) , I evaluated workload and performance on the Air Traffic Scenarios Test in SPAM, non-SPAM probe, and no-probe conditions.  ...  Application: Cautious users of online assessment measures, like SPAM, may want to remove performance immediately subsequent to probes from analysis, use an inter-probe interval longer than 2.83 minutes  ...  If that hypothesis were true, then one should expect that performance in the SPAM condition would be worse than the auditory-shadowing and better than the list-memory condition.  ... 
doi:10.1177/0018720812439206 pmid:23156627 fatcat:eup3bo7m55c63ffhji2ugca4xa

Opinion Mining and Review Spam Detection: Issues and Challenges

Siddu P. Algur, Jyoti G. Biradar
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
The study finally discusses the application areas, research challenges and research scope explored from the open issues in this area.  ...  Public opinions and experience are valuable information in decision making process.  ...  worse.  ... 
doi:10.23956/ijarcsse/v7i1/0170 fatcat:f7bzjtqpczc7xpxg3jr2c4kev4

On robust image spam filtering via comprehensive visual modeling

Jialie Shen, Robert H. Deng, Zhiyong Cheng, Liqiang Nie, Shuicheng Yan
2015 Pattern Recognition  
In addition, a resampling based learning framework is developed to effectively integrate random forest and linear discriminative analysis (LDA) to generate comprehensive signature of spam images.  ...  In this paper, we report a novel system called RoBoTs (Robust BoosTrap based spam detector) to support accurate and robust image spam filtering.  ...  Especially, the hosts in mobile environment could introduce more dynamism and make the case even worse. Comparing to natural images, image spams enjoy a lot of unique characteristics.  ... 
doi:10.1016/j.patcog.2015.02.027 fatcat:7bxwrdqm4zggncvpn3dj7ifdwi

Machine Learning Methods in E-mail Spam Classification

Piotr Świtalski, Mateusz Kopówka
2020 Studia Informatica  
We show that these methods can be useful in classification of malicious messages. We also compared developed methods and presented results in the experimental section.  ...  Machine learning recently becomes very popular technique in classification methods. It has been successfully used in spam classification.  ...  The results for this experiment are listed in Tab. 2. In this case results obtained by K-Nearest Neighbor were worse than values (about 30%) obtained by others classifiers.  ... 
doi:10.34739/si.2019.23.04 fatcat:khnwckmxevfvlp64tvtz5jnyti
« Previous Showing results 1 — 15 out of 2,444 results