參考文獻 |
[1] ”Kaspersky Security Bulletin Spam Evolution 2012,”
http://www.securelist.com/en/analysis/204792276/
Kaspersky_Security_Bulletin_Spam_Evolution_2012,
Accessed: July 5 2013.
[2] ”Kaspersky: Spam in February 2013,”
http://www.securelist.com/en/analysis/204792284/Spam_
in_February_2013 , Accessed: 5 July 2013.
[3] ”Federal Trade Commission,”
http://www.ftc.gov/opa/2004/01/opsecure.shtm, January 29,
2004.
[4] ”Symantec Corp. Spam Reasearch,”
http://www.symantec.com/threatreport/topic.jsp?id=spam_
fraud_activity_trends&aid=analysis_of_spam_delivered_
by_botnets, Accessed: 5 July 2013.
[5] ”Symantec Corp. MessageLabs Intelligence: 2010 Annual Security
Report,” http://www.symantec.com/about/news/release/
article.jsp?prid=20101207_01, Accessed: 5 July 2013.
[6] ”Symantec Corp. State Of Spam 2012,”
http://www.symantec.com/content/en/us/enterprise/other_
resources/b-intelligence_report_10_2012.en-us.pdf,
Accessed: 5 July 2013.
[7] Natale Maria Bianchi, ”Spamhaus.org: Spam through compromised
passwords: can it be stopped,” http://www.spamhaus.org/news/
article/681/, May 9, 2012.
[8] ”Times of india: Rustock Botnet,”
http://timesofindia.indiatimes.com/tech/itslideshow/
6206110.cms, July 23, 2010.
[9] G. Stringhini, M. Egele, A. Zarras, T. Holz, C. Kruegel, and G.
Vigna, ??B@ bel: leveraging email delivery for spam mitigation,??
in Proceedings of the USENIX Security Symposium, pp. 22, Aug.
8-10, 2012.
[10] G. Stringhini, T. Holz, B. Stone-Gross, C. Kruegel, and G. Vigna,
”BOTMAGNIFIER: Locating Spambots on the Internet,” in Proceedings
of the USENIX Security Symposium,Aug. 8-12, 2011.
[11] ”Spamhaus: Top 10 Worst ISP,”
http://www.spamhaus.org/statistics/networks/,
Accessed: 5 Mar. 2013.
[12] ”Trustwave: SpiderLabs - Spam statistics,”
https://www.trustwave.com/support/labs/spam_statistics.
asp, Accessed: 1 Jan. 2013.
[13] ”Commtouch: Spam Report 2011 July,”
http://www.commtouch.com/sites/default/files/
Commtouch-Trend-Report-2011-July_0.pdf,
Accessed: 5 July 2013.
[14] ”Commtouch: Spam Report 2011 October,”
http://www.commtouch.com/uploads/pdf/
Commtouch-Trend-Report-2011-October.pdf,
Accessed: 5 July 2013.
[15] ”Commtouch: Hacked Accounts Report,”
http://www.commtouch.com/sites/default/files/
The-state-of-hacked-accounts.pdf, Accessed: 5 July 2013.
[16] ”The Spamhaus Project,”
http://www.spamhaus.org/, Accessed: 5 July 2013.
[17] ”Google Blog: An Update On Our War Against Account Hijackers,”
http://googleblog.blogspot.tw/2013/02/
an-update-on-our-war-against-account.html,
February 19, 2013.
[18] ”Messaging Anti-Abuse Working Group 2010 Survey,”
http://www.maawg.org/system/files/2010_MAAWG-Consumer_
Survey.pdf, March, 2010.
[19] ”National Technology Readiness Survey 2004 Summary Report,”
http://www.technoreadymarketing.com/articles.php, February
3, 2005.
[20] ”National Technology Readiness Survey 2009 SPAM Report,”
http://www.technoreadymarketing.com/NTRS_2009_SPAM_
Cost.php, Accessed: 5 July 2013.
[21] A. Ramachandran, A. Dasgupta, N. Feamster, and K. Weinberger,
”Spam or ham?: characterizing and detecting fraudulent not spam
reports in web mail systems,” in Proceedings of the 8th Annual Collaboration,
Electronic messaging, Anti-Abuse and Spam Conference,
pp. 210-219, 2011.
[22] Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, et al., ”BotGraph:
Large Scale Spamming Botnet Detection,” in Proc. 6th USENIX
NSDI, pp. 321-334, Apr, 2009.
[23] ”Email-Sending-Limit,”
http://www.yetesoft.com/free-email-marketing-resources/
email-sending-limit/, April, 2013.
[24] ”Email Sending Limits Of ISPs And Other Providers,”
http://support.e-zekiel.com/templates/System/details.
asp?id=31606&fetch=26546, April, 2012.
[25] ”Gmail Sending Limits,”
https://support.google.com/a/bin/answer.py?hl=
en&answer=166852, Accessed: 5 July 2013.
[26] ”Vipul’s Razor,”
http://razor.sourceforge.net/, Accessed: 5 July 2013.
[27] T. A. Meyer and B. Whateley, ”SpamBayes: Effective open-source,
Bayesian based, email classification system,” in Collaboration, Electronic
messaging, Anti-Abuse and Spam Conference, 2004.
[28] M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz, ”A Bayesian
approach to filtering junk e-mail,” in Learning for Text Categorization:
Papers from the 1998 workshop, pp. 98-105, 1998.
[29] D. Sculley and G. M. Wachman, ”Relaxed online SVMs for spam filtering,”
inProceedings of the 30th annual international ACM SIGIR
conference on Research and development in information retrieval,
pp. 415-422, 2007.
[30] B. Taylor, ”Sender Reputation in a Large Webmail Service,” in In
Collaboration, Electronic messaging, Anti-Abuse and Spam Conference,
2006.
[31] D. Lowd and C. Meek, ”Good Word Attacks on Statistical Spam
Filters,” in In Collaboration, Electronic messaging, Anti-Abuse and
Spam Conference, 2005.
[32] B. Nelson, M. Barreno, F. J. Chi, A. D. Joseph, B. I. Rubinstein, U.
Saini, et al., ”Exploiting Machine Learning to Subvert Your Spam
Filter,” in In USENIX Symposium on Networked Systems Design
and Implementation, pp. 1-9, 2008.
[33] Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov,
”Spamming botnets: signatures and characteristics,” in ACM
SIGCOMM Computer Communication Review, pp. 171-182, 2008.
[34] H. Drucker, D. Wu, and V. N. Vapnik, ”Support vector machines
for spam categorization,” Neural Networks, IEEE Transactions.,
vol. 10, pp. 1048-1054, 1999.
[35] Y. Gao, M. Yang, and A. Choudhary, ”Semi supervised image spam
hunter: A regularized discriminant em approach,” in Advanced Data
Mining and Applications, pp. 152-164, 2009.
[36] S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser, ”Detecting
Spammers with SNARE: Spatio-temporal Network-level Au-
tomatic Reputation Engine,” in USENIX Security Symposium, pp.
101-118, 2009.
[37] A. Ramachandran, N. Feamster, and S. Vempala, ”Filtering spam
with behavioral blacklisting,” inProceedings of the 14th ACM conference
on Computer and communications security, pp. 342-351,
2007.
[38] S. Venkataraman, S. Sen, O. Spatscheck, P. Haffner, and D. Song,
”Exploiting network structure for proactive spam mitigation,” in
USENIX Security Symposium, pp. 149-166, 2007.
[39] ”Sender Policy Framework,”
http://www.openspf.org/, Accessed: 5 July 2013.
[40] ”DomainKeys Identified Mail,”
http://www.dkim.org/, Accessed: 5 July 2013.
[41] ”Greylisting.org,”
http://www.greylisting.org/, Accessed: 5 July 2013.
[42] C. Jennings, ”Computational Puzzles for SPAM Reduction in SIP,”
in Internet-draft, 2007.
[43] M. Cristea and B. Groza, ”Augmenting a webmail application with
cryptographic puzzles to deflect spam,” inNew Technologies, Mobility
and Security, 2011 4th IFIP International Conference, pp. 1-5,
2011.
[44] W.-c. Feng and E. Kaiser, ”kapow webmail: Effective disincentives
against spam,” in Proc. of 7th CEAS, 2010. |