

Novel Approaches to Prevent Spams
Abstract
Keywords
References
Z.Zhong, L. Ramaswamy, and K. Li, “Privacy-Aware Collaborative Spam Filtering,” Proc. IEEE INFOCOM ’09, Apr. 2009.
V.Schryver, Distributed Checksum Clearinghouse, http:// www.rhyolite.com/anti- spam/dcc/, Nov. 2005.
Vipul’s Razor Anti-Spam System, Vipul Ved Prakash, http:// razor.sourceforge.net/, 2008.
D. Lowd and C. Meek, “Good Word Attacks on Statistical Spam Filter,” Proc. SecondEmail and Anti-SPAM Conf. (CEAS ’05),July 2005.
G.V. Cormark and T. Lynam, “Spam Corpus Creation for TREC,”Proc. Second Emailand Anti-SPAM Conf. (CEAS), 2005.
A. Broder, “Some Applications of Rabins Fingerprinting Method,”Sequences II: Methodsin Communications, Security, and Computer Science. Springer-Verlag, pp. 143-152, 1993.
G.L. Wittel and S.F. Wu, “On Attacking Statistical Spam Filters,”Proc. First Email and Anti-SPAM Conf. (CEAS ’04), July 2004.
D. Lowd and C. Meek, “Good Word Attacks on Statistical Spam Filter,” Proc. Second Email and Anti-SPAM Conf. (CEAS ’05), July 2005.
] M.W. Wang, Sender Authentication: What to Do, Anti-Abuse WorkingGroup White Paper, http://spf.pobox.com/whitepaper.pdf,2008.
A. Gray and M. Haahr, “Personalised, Collaborative SpamFiltering,” Proc. Second Email and Anti-SPAM Conf. (CEAS), 2005.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.