Author:
Srinivasan Arvind,Chan Chien-Chung
Reference53 articles.
1. Abu-Nimeh S, Nappa D, Wang X, Nair S (2007) A comparison of machine learning techniques for phishing detection. In: Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit (eCrime’07). ACM, New York, pp 60–69
2. Ailon N, Karnin ZS, Liberty E, Maarek Y (2013) Threading machine generated email. In: Proceedings of the sixth ACM international conference on web search and data mining (WSDM’13). ACM, New York, pp 405–414
3. Arasu A, Ré C, Suciu D (2009) Large-scale deduplication with constraints using dedupalog. In: 2009 IEEE 25th international conference on data engineering, Shanghai, pp 952–963
4. Balog K, Azzopardi L, de Rijke M (2006) Formal models for expert finding in enterprise corpora. In: Proceedings of the 29th annual international ACM SIGIR conference on research and development in information retrieval (SIGIR’06). ACM, New York, pp 43–50
5. Bekkerman R (2018) Automatic categorization of email into folders: benchmark experiments on Enron and SRI corpora. Computer Science Department Faculty Publication Series, 218