2007
DOI: 10.1016/j.peva.2006.11.001
|View full text |Cite
|
Sign up to set email alerts
|

Workload models of spam and legitimate e-mails

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
1

Year Published

2008
2008
2018
2018

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 36 publications
(28 citation statements)
references
References 6 publications
0
27
1
Order By: Relevance
“…Content pollution has been observed in various applications, including e-mail [15], Web search engines [13], blogs [29]. Thus, a number of detection and combating strategies have been proposed [9,16,25,32].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Content pollution has been observed in various applications, including e-mail [15], Web search engines [13], blogs [29]. Thus, a number of detection and combating strategies have been proposed [9,16,25,32].…”
Section: Related Workmentioning
confidence: 99%
“…The crawler ran for one week (01/ [11][12][13][14][15][16][17][18]2008), gathering a total of 264,460 users, 381,616 responded videos and 701,950 video responses. This dataset produces a large weakly connected component of graph (X, Y ), and is used as source for building our test collection, as described next.…”
Section: Crawling Youtubementioning
confidence: 99%
“…sender and receiver. However, most recent studies of network traffic analysis have focused on Internet traffic (World Wide Web), only a few researches [5][6][7][8][9] analyzing the characteristics and behavior of mail traffic, which are based on scales and its protocol requests in the network traffic…”
Section: Introductionmentioning
confidence: 99%
“…The reason for this huge difference is that, whereas previous studies of outgoing spam mostly use small sized datasets taken from academic institutes [16,11,13,18] or from Enron's public data set [14], our study uses a data set collected by the mail servers of a large ESP. Table 2 provides additional information regarding our data set.…”
Section: Data Set and Feature Extractionmentioning
confidence: 99%