Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 161 matches
- 2011
- Sidharth Chhabra, Anupama Aggarwal, Fabrício Benevenuto, Ponnurangam Kumaraguru:
Phi.sh/$oCiaL: the phishing landscape through short URLs. CEAS 2011: 92-101 - Giacomo Fiumara, Massimo Marchi, Rosamaria Pagano, Alessandro Provetti, N. Spada:
A rule-based system for end-user e-mail annotations. CEAS 2011: 102-108 - Yutaro Fujii, Takuya Yoshimura, Takayuki Ito:
Filtering harmful sentences based on three-word co-occurrence. CEAS 2011: 64-72 - Binod Gyawali, Thamar Solorio, Manuel Montes-y-Gómez, Brad Wardman, Gary Warner:
Evaluating a semisupervised approach to phishing url identification in a realistic scenario. CEAS 2011: 176-183 - Cheng Hsin Hsu, Polo Wang, Samuel Pu:
Identify fixed-path phishing attack by STC. CEAS 2011: 172-175 - Shaghayegh Jaberi, Amir Masoud Rahmani, Ahmad Khademzadeh:
Trusted data fusion by using cellular automata in wireless sensor networks. CEAS 2011: 145-151 - Jafar Haadi Jafarian, Ali Abbasi, Siavash Safaei Sheikhabadi:
A gray-box DPDA-based intrusion detection technique using system-call monitoring. CEAS 2011: 1-12 - Michael G. Kaplan:
Automatic authentication of email servers and personal computers independent of the active participation of server administrators or personal computer users. CEAS 2011: 38-45 - Mahmoud Khonji, Youssef Iraqi, Andrew Jones:
Lexical URL analysis for discriminating phishing and legitimate websites. CEAS 2011: 109-115 - Mahmoud Khonji, Andrew Jones, Youssef Iraqi:
A study of feature subset evaluators and feature subset searching methods for phishing classification. CEAS 2011: 135-144 - Carlos Laorden, Xabier Ugarte-Pedrero, Igor Santos, Borja Sanz, Pablo García Bringas:
Enhancing scalability in anomaly-based email spam filtering. CEAS 2011: 13-22 - Adrian E. McElligott:
A security pass for messages: message keys. CEAS 2011: 184-192 - Tatsuya Mori, Kazumichi Sato, Yousuke Takahashi, Keisuke Ishibashi:
How is e-mail sender authentication used and misused? CEAS 2011: 31-37 - Jernej Porenta, Mojca Ciglaric:
Empirical comparison of IP reputation databases. CEAS 2011: 220-226 - Jay Pujara, Hal Daumé III, Lise Getoor:
Using classifier cascades for scalable e-mail classification. CEAS 2011: 55-63 - Anirudh Ramachandran, Anirban Dasgupta, Nick Feamster, Kilian Q. Weinberger:
Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems. CEAS 2011: 210-219 - Marco Túlio Ribeiro, Pedro Henrique Calais Guerra, Leonardo Vilela, Adriano Veloso, Dorgival O. Guedes, Wagner Meira Jr., Marcelo H. P. C. Chaves, Klaus Steding-Jessen, Cristine Hoepers:
Spam detection using web page content: a new battleground. CEAS 2011: 83-91 - Farida Ridzuan, Vidyasagar M. Potdar, Jaipal Singh:
Storage cost of spam 2.0 in a web discussion forum. CEAS 2011: 200-209 - Fernando Sanchez, Zhenhai Duan, Yingfei Dong:
Blocking spam by separating end-user machines from legitimate mail server machines. CEAS 2011: 116-124 - Igor Santos, Xabier Ugarte-Pedrero, Borja Sanz, Carlos Laorden, Pablo García Bringas:
Collective classification for packed executable identification. CEAS 2011: 23-30 - Olivier Thonnard, Marc Dacier:
A strategic analysis of spam botnets operations. CEAS 2011: 162-171 - Yuan Tian, Biao Song, Eui-nam Huh:
Dynamic content-based cloud data integration system with privacy and cost concern. CEAS 2011: 193-199 - De Wang, Danesh Irani, Calton Pu:
A social-spam detection framework. CEAS 2011: 46-54 - Andrew G. West, Jian Chang, Krishna K. Venkatasubramanian, Oleg Sokolsky, Insup Lee:
Link spamming Wikipedia for profit. CEAS 2011: 152-161 - Andrew G. West, Insup Lee:
Towards the effective temporal association mining of spam blacklists. CEAS 2011: 73-82 - John S. Whissell, Charles L. A. Clarke:
Clustering for semi-supervised spam filtering. CEAS 2011: 125-134 - Vidyasagar M. Potdar:
The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS 2011, Perth, Australia, September 1-2, 2011, Proceedings. ACM 2011, ISBN 978-1-4503-0788-8 [contents] - 2008
- André Bergholz, Jeong Ho Chang, Gerhard Paass, Frank Reichartz, Siehyun Strobel:
Improved Phishing Detection using Model-Based Features. CEAS 2008 - André Bergholz, Gerhard Paass, Frank Reichartz, Siehyun Strobel, Marie-Francine Moens, Brian Witten:
Detecting Known and New Salting Tricks in Unwanted Emails. CEAS 2008 - Robert Beverly, Karen R. Sollins:
Exploiting Transport-Level Characteristics of Spam. CEAS 2008
skipping 131 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-03 23:35 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint