Author:
Giaretta Alberto,Dragoni Nicola
Publisher
Springer International Publishing
Reference9 articles.
1. Almomani A, Gupta BB, Atawneh S, Meulenberg A, Almomani E (2013) A survey of phishing email filtering techniques. IEEE Commun Surv Tutor 15(4):2070–2090
2. Baki S, Verma R, Mukherjee A, Gnawali O (2017) Scaling and effectiveness of email masquerade attacks: exploiting natural language generation. In: Proceedings of the 2017 ACM on Asia conference on computer and communications security, ASIA CCS 2017. ACM, New York, pp 469–482.
https://doi.org/10.1145/3052973.3053037
3. Blanzieri E, Bryl A (2008) A survey of learning-based techniques of email spam filtering. Artif Intell Rev 29(1):63–92.
https://doi.org/10.1007/s10462-009-9109-6
4. Mazzara M, Biselli L, Greco PP, Dragoni N, Marraffa A, Qamar N, De Nicola S (2013) Social networks and collective intelligence: a return to the agora (chap. 5). In: Fagerberg J, Mowery DC, Nelson RR, Caviglione L, et al (eds) Social network engineering for secure web data and services. Oxford University Press, IGI Global, pp 88–113
5. Nelson B, Barreno M, Chi FJ, Joseph AD, Rubinstein BIP, Saini U, Sutton C, Tygar JD, Xia K (2008) Exploiting machine learning to subvert your spam filter. In: Proceedings of the 1st USENIX workshop on large-scale exploits and emergent threats, LEET 2008. USENIX Association, Berkeley, pp 7:1–7:9.
http://dl.acm.org/citation.cfm?id=1387709.1387716
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献