2006
DOI: 10.1016/j.cose.2006.06.001
|View full text |Cite
|
Sign up to set email alerts
|

Tightening the net: A review of current and next generation spam filtering tools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
46
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 71 publications
(53 citation statements)
references
References 10 publications
(11 reference statements)
0
46
0
Order By: Relevance
“…We did not take any measures to counter obfuscated words in the spam messages. Given that there are a large number of possibilities to disguise a word, most content-based spam filters will not be able to deobfuscate the text of a message efficiently (Carpinter & Hunt, 2006). Recently, an efficient complementary filter (Lee & Ng, 2005) has been demonstrated to be able to effectively deobfuscate text with high accuracy.…”
Section: Experimental Datamentioning
confidence: 99%
See 1 more Smart Citation
“…We did not take any measures to counter obfuscated words in the spam messages. Given that there are a large number of possibilities to disguise a word, most content-based spam filters will not be able to deobfuscate the text of a message efficiently (Carpinter & Hunt, 2006). Recently, an efficient complementary filter (Lee & Ng, 2005) has been demonstrated to be able to effectively deobfuscate text with high accuracy.…”
Section: Experimental Datamentioning
confidence: 99%
“…Given that there are millions of e-mail users, profit-driven spammers have great incentives to spam. With as little as 0.001% response rate, a spammer could potentially profit $25,000 on a $50 product (Carpinter and Hunt, 2006). Over the years, spammers have grown in sophistication with cutting-edge technologies and have become more evasive.…”
Section: Introductionmentioning
confidence: 99%
“…The main content analysis studies are naïve Bayes, support vector machines, artificial neural networks, logistic regression, lazy learning, artificial immune systems, boosting, ensembles, image analysis, and hybrid methods. The authors in [3][4][5] classified and evaluated these methods in their studies.…”
Section: Operations Of Antispammersmentioning
confidence: 99%
“…On the other hand, a great many methods were proposed to block spams in academic and commercial circles and are being used [3][4][5][6]. However, these methods fall short, as statistics report that spam amounts have been increasing each day.…”
Section: Introductionmentioning
confidence: 99%
“…The term spam was used to define the undesirable message, junk-mails sent to web users' inbox. It is most opportune for email spammers to send lots of messages to millions of users simply and without cost [2]. This makes it a public situation for all web users to receive unsolicited email regularly.…”
Section: Introductionmentioning
confidence: 99%