Abstract is missing.
- A gray-box DPDA-based intrusion detection technique using system-call monitoringJafar Haadi Jafarian, Ali Abbasi, Siavash Safaei Sheikhabadi. 1-12 [doi]
- Enhancing scalability in anomaly-based email spam filteringCarlos Laorden, Xabier Ugarte-Pedrero, Igor Santos, Borja Sanz, Pablo Garcia Bringas. 13-22 [doi]
- Collective classification for packed executable identificationIgor Santos, Xabier Ugarte-Pedrero, Borja Sanz, Carlos Laorden, Pablo Garcia Bringas. 23-30 [doi]
- How is e-mail sender authentication used and misused?Tatsuya Mori, Kazumichi Sato, Yousuke Takahashi, Keisuke Ishibashi. 31-37 [doi]
- Automatic authentication of email servers and personal computers independent of the active participation of server administrators or personal computer usersMichael G. Kaplan. 38-45 [doi]
- A social-spam detection frameworkDe Wang, Danesh Irani, Calton Pu. 46-54 [doi]
- Using classifier cascades for scalable e-mail classificationJay Pujara, Hal Daumé III, Lise Getoor. 55-63 [doi]
- Filtering harmful sentences based on three-word co-occurrenceYutaro Fujii, Takuya Yoshimura, Takayuki Ito. 64-72 [doi]
- Towards the effective temporal association mining of spam blacklistsAndrew G. West, Insup Lee. 73-82 [doi]
- Spam detection using web page content: a new battlegroundMarco Túlio Ribeiro, Pedro Henrique Calais Guerra, Leonardo Vilela, Adriano Veloso, Dorgival Guedes, Wagner Meira Jr., Marcelo H. P. C. Chaves, Klaus Steding-Jessen, Cristine Hoepers. 83-91 [doi]
- Phi.sh/$oCiaL: the phishing landscape through short URLsSidharth Chhabra, Anupama Aggarwal, Fabrício Benevenuto, Ponnurangam Kumaraguru. 92-101 [doi]
- A rule-based system for end-user e-mail annotationsGiacomo Fiumara, Massimo Marchi, Rosamaria Pagano, Alessandro Provetti, N. Spada. 102-108 [doi]
- Lexical URL analysis for discriminating phishing and legitimate websitesMahmoud Khonji, Youssef Iraqi, Andrew Jones. 109-115 [doi]
- Blocking spam by separating end-user machines from legitimate mail server machinesFernando Sanchez, Zhenhai Duan, Yingfei Dong. 116-124 [doi]
- Clustering for semi-supervised spam filteringJohn S. Whissell, Charles L. A. Clarke. 125-134 [doi]
- A study of feature subset evaluators and feature subset searching methods for phishing classificationMahmoud Khonji, Andrew Jones, Youssef Iraqi. 135-144 [doi]
- Trusted data fusion by using cellular automata in wireless sensor networksShaghayegh Jaberi, Amir Masoud Rahmani, Ahmad Khademzadeh. 145-151 [doi]
- Link spamming Wikipedia for profitAndrew G. West, Jian Chang, Krishna K. Venkatasubramanian, Oleg Sokolsky, Insup Lee. 152-161 [doi]
- A strategic analysis of spam botnets operationsOlivier Thonnard, Marc Dacier. 162-171 [doi]
- Identify fixed-path phishing attack by STCCheng-Hsin Hsu, Polo Wang, Samuel Pu. 172-175 [doi]
- Evaluating a semisupervised approach to phishing url identification in a realistic scenarioBinod Gyawali, Thamar Solorio, Manuel Montes-y-Gómez, Brad Wardman, Gary Warner. 176-183 [doi]
- A security pass for messages: message keysAdrian E. McElligott. 184-192 [doi]
- Dynamic content-based cloud data integration system with privacy and cost concernYuan Tian, Biao Song, Eui-nam Huh. 193-199 [doi]
- Storage cost of spam 2.0 in a web discussion forumFarida Ridzuan, Vidyasagar Potdar, Jaipal Singh. 200-209 [doi]
- Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systemsAnirudh Ramachandran, Anirban Dasgupta, Nick Feamster, Kilian Q. Weinberger. 210-219 [doi]
- Empirical comparison of IP reputation databasesJernej Porenta, Mojca Ciglaric. 220-226 [doi]