Spam campaign detection, analysis, and investigation
Tài liệu tham khảo
Anderson, 2007, Spamscatter: characterizing internet scam hosting infrastructure
Bergholz, 2008, Improved phishing detection using model-based features
Bergholz, 2010, New filtering approaches for phishing email, J Comput Secur, 18, 7, 10.3233/JCS-2010-0371
Broder, 1997, Syntactic clustering of the web, Comput Netw ISDN Syst, 29, 1157, 10.1016/S0169-7552(97)00031-7
Calais, 2008, A campaign-based characterization of spamming strategies
Cheung, 2003, Incremental mining of frequent patterns without candidate generation or support constraint, 111
CodeFlower Source code visualization
Daigle, 2004, WHOIS protocol specification, Internet RFC, 3912
Damiani, 2004, An open digest-based technique for spam detection, 559
Data-Driven Documents, http://d3js.org/.
Fette, 2007, Learning to detect phishing emails, 649
Gao, 2010, Detecting and characterizing social spam campaigns, 35
Guerra, 2008, Spam miner: a platform for detecting and characterizing spam campaigns
Haider, 2009, Bayesian clustering for email campaign detection, 385
Han, 2000, Mining frequent patterns without candidate generation, ACM SIGMOD Rec, 29, 1, 10.1145/335191.335372
Han, 2004, Mining frequent patterns without candidate generation: a frequent-pattern tree approach, Data Min Knowl Discov, 8, 53, 10.1023/B:DAMI.0000005258.31418.83
Harrenstien, 1985, WHOIS protocol specification, Internet RFC, 954
Heller, 2005, Bayesian hierarchical clustering, 297
John, 2009, Studying spamming botnets using botlab, vol. 9, 291
Kai-Sang Leung, 2004, Interactive constrained frequent-pattern mining system, 49
Kanich, 2009, Spamalytics: an empirical analysis of spam marketing conversion, Commun ACM, 52, 99, 10.1145/1562164.1562190
Konte, 2009, Dynamics of online scam hosting infrastructure, 219
Kornblum, 2006, Identifying almost identical files using context triggered piecewise hashing, Digit Investig, 3, 91, 10.1016/j.diin.2006.06.015
Landauer, 1998, An introduction to latent semantic analysis, Discourse Process, 25, 259, 10.1080/01638539809545028
Lau, 2011, Automatic labelling of topic models, ACL, 2011, 1536
Leung, 2007, Cantree: a canonical-order tree for incremental frequent-pattern mining, Knowl Inform. Syst, 11, 287, 10.1007/s10115-006-0032-8
Li, 2006, An empirical study of clustering behavior of spammers and group-based anti-spam strategies
Milne, 2013
Moore, 2009, Temporal correlations between spam and phishing websites
Ong, 2003, Fssm: fast construction of the optimized segment support map, 257
OrientDB, http://www.orientdb.org/, last accessed in August 2013.
Pathak, 2009, Botnet spam campaigns can be long lasting: evidence, implications, and analysis, 13
Pitsillidis, 2010, Botnet judo: fighting spam with itself
Pitsillidis, 2012, Taster's choice: a comparative analysis of spam feeds, 427
Qian, 2010, A case for unsupervised-learning-based spam filtering, ACM SIGMETRICS Perform Eval Rev, 38, 367, 10.1145/1811099.1811090
spamsum, http://www.samba.org/ftp/unpacked/junkcode/spamsum/README, (last accessed in August 2013).
Stringhini, 2011, Botmagnifier: locating spambots on the internet
Symantec Intelligence Report, 2013
Thonnard, 2011, A strategic analysis of spam botnets operations, in: proceedings of the 8th annual Collaboration, 162
Wei, 2008, Mining spam email to identify common origins for forensic application, 1433
Wei, 2009, Characterization of spam advertised website hosting strategy
Xie, 2008, Spamming botnets: signatures and characteristics, ACM SIGCOMM Comput Commun Rev, 38, 171, 10.1145/1402946.1402979
Zhuang, 2008, Characterizing botnets from email spam records, LEET, 8, 1