2013 Fourth Cybercrime and Trustworthy Computing Workshop 2013
DOI: 10.1109/ctc.2013.16
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Spam Emails Developments and Authorship Attribution

Abstract: The Internet is a decentralized structure that offers speedy communication, has a global reach and provides anonymity, a characteristic invaluable for committing illegal activities. In parallel with the spread of the Internet, cybercrime has rapidly evolved from a relatively low volume crime to a common high volume crime. A typical example of such a crime is the spreading of spam emails, where the content of the email tries to entice the recipient to click a URL linking to a malicious Web site or downloading a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
2
1

Relationship

4
6

Authors

Journals

citations
Cited by 51 publications
(26 citation statements)
references
References 16 publications
0
23
0
Order By: Relevance
“…While supervised learning allows us to use cross-fold validation to choose good parameters, unsupervised learning must rely either on other metrics (such as cluster stability) or ensemble learning to reduce the impact of bad parameter sets. For this application we chose the latter, given EAC's use in previous studies of this nature [10], [11].…”
Section: Methodsmentioning
confidence: 99%
“…While supervised learning allows us to use cross-fold validation to choose good parameters, unsupervised learning must rely either on other metrics (such as cluster stability) or ensemble learning to reduce the impact of bad parameter sets. For this application we chose the latter, given EAC's use in previous studies of this nature [10], [11].…”
Section: Methodsmentioning
confidence: 99%
“… Spam campaigns: the user receives an e-mail message from a well-known organization with some false banking information attached or with a link included in the e-mail. Once, the user clicks the link or downloads the attached file to the e-mail, the system will be infected [10,37].…”
Section: Typical Spreading Methods For Financial Malwarementioning
confidence: 99%
“…WhatsApp, Orkut etc. are the most commonly used applications to spread the malicious URLs [1], [2], [3]. They host unsolicited information on the web page.…”
Section: Introductionmentioning
confidence: 99%