Search Results

There are 9775 results for: content related to: Compression-based spam filter

  1. Spammers operations: a multifaceted strategic analysis

    Security and Communication Networks

    Volume 9, Issue 4, 10 March 2016, Pages: 336–356, O. Thonnard, Pierre-Antoine Vervier and M. Dacier

    Version of Record online : 9 OCT 2012, DOI: 10.1002/sec.640

  2. Detecting spam through their Sender Policy Framework records

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3555–3563, Devrim Sipahi, Gökhan Dalk��l��ç and Mehmet Hilal Özcanhan

    Version of Record online : 25 MAY 2015, DOI: 10.1002/sec.1280

  3. Simple SMS spam filtering on independent mobile phone

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1209–1220, M. Taufiq Nuruzzaman, Changmoo Lee, Mohd. Fikri Azli bin Abdullah and Deokjai Choi

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.577

  4. A novel approach for spam email detection based on shifted binary patterns

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1216–1225, Yılmaz Kaya and Ömer Faruk Ertuğrul

    Version of Record online : 11 JAN 2016, DOI: 10.1002/sec.1412

  5. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1157

  6. An intelligent three-phase spam filtering method based on decision tree data mining

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4013–4026, Jyh-Jian Sheu, Yin-Kai Chen, Ko-Tsung Chu, Jih-Hsin Tang and Wei-Pang Yang

    Version of Record online : 25 AUG 2016, DOI: 10.1002/sec.1584

  7. Blocking spam by separating end-user machines from legitimate mail server machines

    Security and Communication Networks

    Volume 9, Issue 4, 10 March 2016, Pages: 316–326, Fernando Sanchez, Zhenhai Duan and Yingfei Dong

    Version of Record online : 27 JUN 2012, DOI: 10.1002/sec.587

  8. A novel feature extraction approach in SMS spam filtering for mobile communication: one-dimensional ternary patterns

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4680–4690, Yilmaz Kaya and Ömer Faruk Ertuğrul

    Version of Record online : 19 OCT 2016, DOI: 10.1002/sec.1660

  9. A link graph-based approach to identify forum spam

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 176–188, Youngsang Shin, Steven Myers, Minaxi Gupta and Predrag Radivojac

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.970

  10. A survey of cyber crimes

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 422–437, Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 13 JUL 2011, DOI: 10.1002/sec.331

  11. Trust modeling for message relay control and local action decision making in VANETs

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 1–14, Jie Zhang, Chen Chen and Robin Cohen

    Version of Record online : 15 FEB 2012, DOI: 10.1002/sec.519

  12. Are Individual Investors Influenced by the Optimism and Credibility of Stock Spam Recommendations?

    Journal of Business Finance & Accounting

    Volume 40, Issue 9-10, November/December 2013, Pages: 1155–1183, Karen K. Nelson, Richard A. Price and Brian R. Rountree

    Version of Record online : 17 DEC 2013, DOI: 10.1111/jbfa.12053

  13. Clustering VoIP caller for SPIT identification

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 4827–4838, Muhammad Ajmal Azad, Ricardo Morla, Junaid Arshad and Khaled Salah

    Version of Record online : 16 NOV 2016, DOI: 10.1002/sec.1656

  14. A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1478–1489, Elias Bou-Harb, Makan Pourzandi, Mourad Debbabi and Chadi Assi

    Version of Record online : 6 FEB 2012, DOI: 10.1002/sec.413

  15. Packet-level open-digest fingerprinting for spam detection on middleboxes

    International Journal of Network Management

    Volume 22, Issue 1, January/February 2012, Pages: 12–26, Muhammad N. Marsono

    Version of Record online : 20 APR 2011, DOI: 10.1002/nem.780

  16. Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 626–640, Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu and Yuan-Cheng Lai

    Version of Record online : 21 MAR 2013, DOI: 10.1002/sec.764

  17. SpamED: A spam E-mail detection approach based on phrase similarity

    Journal of the American Society for Information Science and Technology

    Volume 60, Issue 2, February 2009, Pages: 393–409, Maria Soledad Pera and Yiu-Kai Ng

    Version of Record online : 3 OCT 2008, DOI: 10.1002/asi.20962

  18. Filtering and email pricing as solutions to spam

    Canadian Journal of Economics/Revue canadienne d'économique

    Volume 46, Issue 3, August / août 2013, Pages: 881–899, B. Curtis Eaton, Ian A. MacDonald and Laura Meriluoto

    Version of Record online : 20 AUG 2013, DOI: 10.1111/caje.12043

  19. A graph-theoretic framework for isolating botnets in a network

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2605–2623, Padmini Jaikumar and Avinash C. Kak

    Version of Record online : 28 FEB 2012, DOI: 10.1002/sec.500

  20. Experience in management of e-mail delivery delay problems associated with spam e-mail filtering in a university

    Electronics and Communications in Japan

    Volume 95, Issue 1, January 2012, Pages: 8–19, Yutaka Hisanaga, Manabu Sugii, Yue Wang, Atsushi Osa and Hidetoshi Miike

    Version of Record online : 21 DEC 2011, DOI: 10.1002/ecj.10393