[HTML][HTML] Spam campaign detection, analysis, and investigation

S Dinh, T Azeb, F Fortin, D Mouheb, M Debbabi - Digital Investigation, 2015 - Elsevier
Spam has been a major tool for criminals to conduct illegal activities on the Internet, such as
stealing sensitive information, selling counterfeit goods, distributing malware, etc. The …

A case for unsupervised-learning-based spam filtering

F Qian, A Pathak, YC Hu, ZM Mao, Y **e - ACM SIGMETRICS …, 2010 - dl.acm.org
Traditional content-based spam filtering systems rely on supervised machine learning
techniques. In the training phase, labeled email instances are used to build a learning …

Phishing Codebook: A Structured Framework for the Characterization of Phishing Emails

T Saka, R Jain, K Vaniea, N Kökciyan - arxiv preprint arxiv:2408.08967, 2024 - arxiv.org
Phishing is one of the most prevalent and expensive types of cybercrime faced by
organizations and individuals worldwide. Most prior research has focused on various …

Information extraction from spam emails using stylistic and semantic features to identify spammers

S Halder, R Tiwari, A Sprague - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Traditional anti spamming methods filter spam emails and prevent them from entering the
inbox but take no measure to trace spammers and penalize them. We use natural language …

Clustering spam emails into campaigns

MS Alishahi, M Mejri, N Tawbi - 2015 International Conference …, 2015 - ieeexplore.ieee.org
Spam emails constitute a fast growing and costly problems associated with the Internet
today. To fight effectively against spammers, it is not enough to block spam messages …

[PDF][PDF] Spam campaign cluster detection using redirected urls and randomized sub-domains

AAM Shoeb, D Mukhopadhyay, S Al Noor… - Social Informatics …, 2015 - academia.edu
A substantial majority of the email sent everyday is spam. Spam emails cause many
problems if someone acts or clicks on the link provided in the email body. The problems may …

Using closed frequent sets to cluster malwares

A Sprague, A Rhodes, G Warner - 2013 XXIV International …, 2013 - ieeexplore.ieee.org
The static analysis of malwares at UAB starts with the receipt of about 5000 malwares each
day. One of our goals is to cluster these malwares into families. Each malware is an …

Identifying features to improve real time clustering and domain blacklisting

S Halder, R Tiwari, A Sprague - … of the 50th Annual Southeast Regional …, 2012 - dl.acm.org
Feature analysis is an important task in the area of information extraction. Appropriate
features give improved performance for any classification or clustering algorithm. In this …

[PDF][PDF] Spam campaign detection, analysis, and formalization

M Sheikhalishahi - 2016 - corpus.ulaval.ca
Spam emails yearly impose extremely heavy costs in terms of time, storage space, and
money to both private users and companies. To effectively fight the problem of spam emails …

[CITATION][C] Odnajdywanie kampanii spamowych poprzez porównywanie cech szczególnych e-maili i podobieństwo tekstowe

R Gajewski, A Korczak, A Kozakiewicz - Przegląd Telekomunikacyjny+ Wiadomości …, 2020