PPT-Towards Online Spam Filtering in Social Networks
Author : conchita-marotz | Published Date : 2016-07-17
Hongyu Gao Yan Chen Kathy Lee Diana Palsetia and Alok Choudhary Lab for Internet and Security Technology LIST Department of EECS Northwestern University
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Towards Online Spam Filtering in Social ..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Towards Online Spam Filtering in Social Networks: Transcript
Hongyu Gao Yan Chen Kathy Lee Diana Palsetia and Alok Choudhary Lab for Internet and Security Technology LIST Department of EECS Northwestern University Background 2 Background. Alan Lee. NTT MSC. Background. Working group of the ISF. TIME, Maxis, Jaring, NTT MSC. Need for collaboration among the IASP at National level. To Combat Spam. Objectives. To establish a national anti-spam efforts. Filtering. Service. Kurt Thomas. , Chris Grier, Justin Ma,. Vern . Paxson. , Dawn Song. University of California, Berkeley. International Computer Science Institute. Motivation. Social Networks. (. Facebook, Twitter). Lydia Song, Lauren Steimle, . Xiaoxiao. . Xu. Outline. Introduction to Project . Pre-processing . Dimensionality Reduction. Brief discussion of different algorithms. K-nearest. D. ecision tree. Logistic regression. Fernando. Sanchez, . Zhenhai Duan. Florida State University. Yingfei. Dong. University of Hawaii. Problem Statement. Email header forgery. But to what degree and how well they do it?. Why this is important?. threat to Internet users. A collaborative approach. is needed to provide the best spam-mitigation solutions. and security protection. . The Challenge of Spam. Different stakeholders are taking different steps. Ethan Grefe. December . 13, . 2013. Motivation. Spam email . is constantly cluttering inboxes. Commonly removed using rule based filters. Spam often has . very similar characteristics . This allows . Suranga Seneviratne. . . ✪. , . Aruna. Seneviratne . . ✪. , . Mohamed Ali (Dali) . Kaafar. . . , . Anirban. . Mahanti. . . , . Prasant. . Mohapatra. . ★. UNSW. . NICTA. , Australia. Vacha Dave . +. , Saikat Guha. ★. and Yin Zhang *. . + . University of California, San Diego. . ★ . Microsoft Research . India. . * The University of Texas at Austin. . Internet Advertising Today. Authors. Abu Awal Md Shoeb, Dibya Mukhopadhyay, Shahid Al Noor, Alan Sprague, and Gary Warner. Dec 14, 2014, Harvard University. 1. Introduction. Why spam detection is important. Why it is difficult to detect. Principal Group Program Manager. Microsoft. Protect Your Organization with Exchange Online Protection (EOP). SPR203. How may I protect. my employees from spam and malware. my company from data loss. using Exchange . Spam:. Spam is unsolicited or undesired electronic junk mail. Characteristics of spam are:. Mass . mailing to large number of recipients. Usually a commercial advertisement. Annoying but usually harmless unless coupled with a fraud based phishing scam . Spam:. Spam is unsolicited or undesired electronic junk mail. Characteristics of spam are:. Mass . mailing to large number of recipients. Usually a commercial advertisement. Annoying but usually harmless unless coupled with a fraud based phishing scam . Spam is unsolicited . e. mail in the form of:. Commercial advertising. Phishing. Virus-generated . Spam. Scams. E.g. Nigerian Prince who has an inheritance he wishes to share. What is Bulk Email?. Bulk . Renato Francesco Giorgini . Evangelist IT Pro. RenatoFrancesco.Giorgini@microsoft.com. Agenda. Panoramica. Architettura. Funzionalità Anti-Spam. Funzionalità Anti-Virus. Policy Enforcment. Setup Iniziale.
Download Document
Here is the link to download the presentation.
"Towards Online Spam Filtering in Social Networks"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents