Search Results

There are 12615 results for: content related to: Spammers operations: a multifaceted strategic analysis

  1. A novel approach for spam email detection based on shifted binary patterns

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1216–1225, Yılmaz Kaya and Ömer Faruk Ertuğrul

    Version of Record online : 11 JAN 2016, DOI: 10.1002/sec.1412

  2. A link graph-based approach to identify forum spam

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 176–188, Youngsang Shin, Steven Myers, Minaxi Gupta and Predrag Radivojac

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.970

  3. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1157

  4. Detecting spam through their Sender Policy Framework records

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3555–3563, Devrim Sipahi, Gökhan Dalk��l��ç and Mehmet Hilal Özcanhan

    Version of Record online : 25 MAY 2015, DOI: 10.1002/sec.1280

  5. Simple SMS spam filtering on independent mobile phone

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1209–1220, M. Taufiq Nuruzzaman, Changmoo Lee, Mohd. Fikri Azli bin Abdullah and Deokjai Choi

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.577

  6. An intelligent three-phase spam filtering method based on decision tree data mining

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4013–4026, Jyh-Jian Sheu, Yin-Kai Chen, Ko-Tsung Chu, Jih-Hsin Tang and Wei-Pang Yang

    Version of Record online : 25 AUG 2016, DOI: 10.1002/sec.1584

  7. Blocking spam by separating end-user machines from legitimate mail server machines

    Security and Communication Networks

    Volume 9, Issue 4, 10 March 2016, Pages: 316–326, Fernando Sanchez, Zhenhai Duan and Yingfei Dong

    Version of Record online : 27 JUN 2012, DOI: 10.1002/sec.587

  8. A novel feature extraction approach in SMS spam filtering for mobile communication: one-dimensional ternary patterns

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4680–4690, Yilmaz Kaya and Ömer Faruk Ertuğrul

    Version of Record online : 19 OCT 2016, DOI: 10.1002/sec.1660

  9. Packet-level open-digest fingerprinting for spam detection on middleboxes

    International Journal of Network Management

    Volume 22, Issue 1, January/February 2012, Pages: 12–26, Muhammad N. Marsono

    Version of Record online : 20 APR 2011, DOI: 10.1002/nem.780

  10. Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 626–640, Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu and Yuan-Cheng Lai

    Version of Record online : 21 MAR 2013, DOI: 10.1002/sec.764

  11. A survey of cyber crimes

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 422–437, Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 13 JUL 2011, DOI: 10.1002/sec.331

  12. Are Individual Investors Influenced by the Optimism and Credibility of Stock Spam Recommendations?

    Journal of Business Finance & Accounting

    Volume 40, Issue 9-10, November/December 2013, Pages: 1155–1183, Karen K. Nelson, Richard A. Price and Brian R. Rountree

    Version of Record online : 17 DEC 2013, DOI: 10.1111/jbfa.12053

  13. Compression-based spam filter

    Security and Communication Networks

    Volume 9, Issue 4, 10 March 2016, Pages: 327–335, Tiago A. Almeida and Akebo Yamakami

    Version of Record online : 25 SEP 2012, DOI: 10.1002/sec.639

  14. Clustering VoIP caller for SPIT identification

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 4827–4838, Muhammad Ajmal Azad, Ricardo Morla, Junaid Arshad and Khaled Salah

    Version of Record online : 16 NOV 2016, DOI: 10.1002/sec.1656

  15. A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1478–1489, Elias Bou-Harb, Makan Pourzandi, Mourad Debbabi and Chadi Assi

    Version of Record online : 6 FEB 2012, DOI: 10.1002/sec.413

  16. Filtering and email pricing as solutions to spam

    Canadian Journal of Economics/Revue canadienne d'économique

    Volume 46, Issue 3, August / août 2013, Pages: 881–899, B. Curtis Eaton, Ian A. MacDonald and Laura Meriluoto

    Version of Record online : 20 AUG 2013, DOI: 10.1111/caje.12043

  17. A graph-theoretic framework for isolating botnets in a network

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2605–2623, Padmini Jaikumar and Avinash C. Kak

    Version of Record online : 28 FEB 2012, DOI: 10.1002/sec.500

  18. SpamED: A spam E-mail detection approach based on phrase similarity

    Journal of the American Society for Information Science and Technology

    Volume 60, Issue 2, February 2009, Pages: 393–409, Maria Soledad Pera and Yiu-Kai Ng

    Version of Record online : 3 OCT 2008, DOI: 10.1002/asi.20962

  19. Filtering spam from bad neighborhoods

    International Journal of Network Management

    Volume 20, Issue 6, November/December 2010, Pages: 433–444, Ward van Wanrooij and Aiko Pras

    Version of Record online : 15 OCT 2010, DOI: 10.1002/nem.753

  20. Wirebrush4SPAM: a novel framework for improving efficiency on spam filtering services

    Software: Practice and Experience

    Volume 43, Issue 11, November 2013, Pages: 1299–1318, N. Pérez-Díaz, D. Ruano-Ordas, F. Fdez-Riverola and J.R. Méndez

    Version of Record online : 18 JUN 2012, DOI: 10.1002/spe.2135