|
|
|
|
|
|
|
|
Thursday, August 21 |
Friday, August 22 |
|
8:00-9:00 |
Breakfast Service |
|
|
8:45-9:00 |
Opening |
|
9:00-10:00 |
Keynote by Lois Greisman |
Keynote by Bradley Taylor |
|
|
Federal Trade Commission |
Fighting Spam: Gmail's Story |
|
10:00-10:20 |
Coffee Break |
|
|
10:20-12:00 |
Filtering Techniques |
Email Usage and Applications |
|
|
Improved Phishing Detection using Model-Based Features |
Reducing E-Discovery Cost by
Filtering Included Emails
|
|
|
Andre Bergholz, Jeong-Ho Chang, Gerhard Paass, Frank
Reichartz, Siehyun Strobel
|
Tsuen-Wan Ngan |
|
|
Filtering Email Spam in the Presence of Noisy User Feedback |
Toward a stochastic speech act model
of email behavior
|
|
|
D. Sculley, Gordon Cormack |
John Mildinhall, Jan Noyes |
|
|
Exploiting Transport-Level Characteristics of Spam |
Activity-centred Search in Email |
|
|
Robert Beverly, Karen Solins |
Einat Minkov, Ramnath
Balasubramanyan, William Cohen
|
|
|
Personalized Spam Filtering for Gray Mail |
Short Paper: Do Zebras get more Spam than Aardvarks? |
|
|
Ming-Wei Chang, Scott Yih, Robert
McCann
|
Richard Clayton |
|
12:00-1:40 |
Lunch Break (catered) |
|
|
1:40-3:20 |
Trusted Friends |
Filtering and Evaluation |
|
|
Improving Email Trustworthiness through Social-Group Key
Authentication
|
Breaking out of the Browser to Defend
Against Phishing Attacks
|
|
|
Vivek Pathak, Danfeng Yao, Liviu Iftode |
Diana Smetters, Paul Stewart |
|
|
Tracking Email Reputation for Authenticated Sender Identities |
Resolving FP-TP Conflict in
Digest-Based Collaborative Spam Detection by Use of Negative Selection
Algorithm
|
|
|
Gautam Singaraju, Jeffrey Moss, Brent ByungHoon Kang |
Slavisa Sarafijanovic, Sabrina Perez,
Jean-Yves Le Boudec
|
|
|
Social Honeypots: Making Friends With A Spammer Near You |
Global-scale Anti-spam Testing in
Your Own Back Yard
|
|
|
Steve Webb, James Caverlee, Calton Pu |
Margaret Nielsen, Dane Bertram,
Sampson Pun, John Aycock, Nathan Friess
|
|
|
On Free Speech and Civil Discourse: Filtering Abuse in Blog
Comments
|
A Mail Client Plugin for
Privacy-Preserving Spam Filter Evaluation
|
|
|
D. Sculley |
Mona Mojdeh, Gordon Cormack |
|
3:20-3:50 |
Coffee Break |
|
|
3:50-5:40 |
Sending Spam |
Black- and Whitelisting |
|
|
A Survey of Modern Spam Tools |
The Effectiveness of Whitelisting: a
User-Study
|
|
|
Henry Stern |
David Erickson |
|
|
A Campaign-based Characterization of Spamming Strategies |
Empirical research on IP blacklisting |
|
|
Pedro Calais, Douglas Pires, Dorgival Guedes, Wagner Meira
Jr., Cristine Hoepers, Klaus Steding-Jessen
|
Christian Dietrich, Christian Rossow |
|
|
Detecting Known and New Salting Tricks in Unwanted Emails |
4:40 Business Meeting |
|
|
Andre
Bergholz, Gerhard Paass, Frank Reichartz,
Siehyun Strobel, Marie-Francine Moens, Brian Witten
|
|
|
Short Papers |
|
|
Improving Image Spam Filtering Using Image Text Features |
|
|
Giorgio
Fumera, Fabio Roli, Battista Biggio, Ignazio Pillai
|
|
|
Analysis of Spectral Parameters of Audio Signals for the
Identification of Spam Over IP Telephony
|
|
|
Christoph Prschmann, Heiko Knospe |
|
6:00-7:00 |
Bar Service |
|
from 7:00 |
Conference Banquet
and Poster Session
|
|
|
|
|
|
|
|
|