skip to main content
research-article

A survey of emerging approaches to spam filtering

Published: 05 March 2008 Publication History

Abstract

From just an annoying characteristic of the electronic mail epoch, spam has evolved into an expensive resource and time-consuming problem. In this survey, we focus on emerging approaches to spam filtering built on recent developments in computing technologies. These include peer-to-peer computing, grid computing, semantic Web, and social networks. We also address a number of perspectives related to personalization and privacy in spam filtering. We conclude that, while important advancements have been made in spam filtering in recent years, high performance approaches remain to be explored due to the large scale of the problem.

References

[1]
Allman, E. 2006. Email authentication: what, why, how? ACM Queue, 4, 9, 30--34.
[2]
Antonopoulos, A., Alexandros, G., Stefanidis, K., and Artemios G. V. 2009. Fighting spammers with spam. In Proceedings of the 9th IEEE International Symposium on Autonomous Decentralized Systems (ISADS'09). http://www.artemiosv.info/Spam.pdf.
[3]
Barreno, M., Nelson, B., Sears, R., Joseph, A. D., and Tygar, J. D. 2006. Can machine learning be secure? In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS'06). ACM, New York, NY, 16--25.
[4]
Benevenuto, F., Rodrigues, T., Almeida, V., Almeida, J., Zhang, C., and Ross, K. 2008. Identifying video spammers in online social networks. In Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web (AIRWeb'08). ACM Press, New York, NY, 45--52.
[5]
Bentley, J. and Mallows, C. 2006. CAPTCHA challenge strings: problems and improvements. In Proceedings of the Document Recognition & Retrieval. 141--147.
[6]
Bernstein, D. 2000. Internet Mail 2000. http://cr.yp.to/im2000.html.
[7]
Blanzieri, E. and Bryl, A. 2008. A survey of learning-based techniques of email spam filtering. Artif. Intell. Rev. 29, 1, 63--92.
[8]
Boyd, D. M. and Ellison, N. B. 2007. Social network sites: definition, history, and scholarship. J. Comput. Mediated Comm. 13, 1, 210--230.
[9]
Brin, S. and Page, L. 1998. The anatomy of a large-scale hypertextual Web search engine. Comput. Netw. 30, 1-7, 107--117.
[10]
Brodsky, A. and Brodsky, D. 2007. Trinity: distributed defense against transient spam-bots. In Proceedings of the 26th Annual ACM Symposium on Principles of Distributed Computing. ACM, New York, NY, 378--379.
[11]
Brown, G., Howe, T., Ihbe, M., Prakash, A., and Borders, K. 2008. Social networks and context-aware spam. In Proceedings of the ACM Conference on Computer Supported Cooperative Work. ACM, New York, NY, 403--412.
[12]
Calais, P., Guedes, D., Meira Jr., W., Hoepers, C., Chaves, M., and Jessen, K. S. 2009. Spamming chains: a new way of understanding spammer behavior. In Proceedings of the 6th Conference on Email and Anti-Spam (CEAS).
[13]
Chen, C., Tian, Y., and Zhang, C. 2008. Spam filtering with several novel bayesian classifiers. In Proceedings the 19th IEEE International Conference on Pattern Recognition. 1--4.
[14]
Chen, J., Xiao, G., Gao, F., and Zhang, Y. 2008. Spam filtering method based on an artificial immune system. In Proceedings of the IEEE International Conference on Multimedia and Information Technology (MMIT). 169--171.
[15]
Chirita, P., Diederich, J., and Nejdl, W. 2005. MailRank: using ranking for spam detection. In Proceedings of the 14th ACM International Conference on Information and Knowledge Management (CIKM'05). ACM, New York, NY, 373--380.
[16]
Chord. 2009. Peer-to-Peer Lookup. http://pdos.csail.mit.edu/chord/faq.html.
[17]
Conry-Murray, A. 2004. The antispam cocktail: Mix it up to stop junk email. Netw. Mag. 19, 7, 33--38.
[18]
Cook, D., Hartnett, J., Manderson, K., and Scanlan, J. 2006. Catching spam before it arrives: Domain specific dynamic blacklists. In Proceedings of the Australasian Workshops on Grid Computing and e-Research, vol. 54, Australian Computer Society, Inc. Darlinghurst, Australia, 193--202.
[19]
Cormack, G. V. and Lynam, T. R. 2007. Online supervised spam filter evaluation. ACM Trans. Inf. Syst. 25, 3, Article 11.
[20]
Curran, K. and Honan, J. S. 2005. Addressing spam e-mail using hashcast. Inter. J. Bus. Admin. 1, 2, 41--65.
[21]
Damiani, E., Vimercati, S., Paraboschi, S., and Samarati, P. 2004. P2P-based collaborative spam detection and filtering. In Proceedings of the 4th IEEE International Conference on Peer-to-Peer Computing (P2P'04).
[22]
Das, A., Datar M., Garg, A., and Rajaram, S. 2007. Google news personalization: scalable online collaborative filtering. In Proceedings of the 16th International Conference on World Wide Web (WWW'07). ACM, New York, NY, 271--280.
[23]
Dean, J. and Ghemawat, S. 2008. MapReduce: Simplified data processing on large clusters. Commun. ACM 51, 1, 107--113.
[24]
Dean, J. 2006. Experiences with MapReduce, an abstraction for large-scale computation. In Proceedings of the 15th International Conference on Parallel Architectures and Compilation Techniques (PACT'06). ACM, New York, NY, 1--1.
[25]
Denny, N. El Hourani, T., Denny, J., Bissmeyer, S., and Irby, D. 2006. SpamCooker: A method for deterring unsolicited electronic communications. In Proceedings of the 3rd International Conference on Information Technology: New Generations (ITNG'06). Los Alamitos, CA, 590--591.
[26]
Dimmock, N. and Maddison, I. 2004. Peer-to-peer collaborative spam detection. Crossroads Mag. 11, 2, 4--4.
[27]
DNSBL, 2009. The Spam Database Lookup. http://www.dnsbl.info/.
[28]
Duan, Z., Dong, Y., and Gopalan, K. 2007. DMTP: controlling spam through message delivery differentiation. Comput. Netw. 51, 10, 2616--2630.
[29]
Esquivel, H., Mori, T., and Akella, A. 2009. RouterLevel spam filtering using TCP fingerprints: architecture and measurement based evaluation. In Proceedings of the 6th Conference on Email and Anti-Spam.
[30]
Ferris Research. 2008. Industry Statistics-Ferris Research. http://www.ferris.com/research-library/industry-statistics/.
[31]
Foukia, N. Zhou, L., and Neuman, B. C. 2006. Multilateral decisions for collaborative defense against unsolicited bulk email. In Proceedings of the 4th International Conference on Trust Management, Lecture Notes in Computer Science. 77--92.
[32]
Gansterer, W. N. and Ilger, M. 2007. Analyzing UCE/UBE traffic. In Proceeding of the 9th International Conference on Electronic Commerce (ICEC'07). ACM, New York, NY, 195--204.
[33]
Gansterer, W., Hlavacs, H., Ilger, M., Lechner, P., and Straub, J. 2006. Token buckets for outgoing spam prevention. In Proceedings of the IASTED International Conference on Communication, Network, and Information Security. 36--41.
[34]
Gansterer, W., Ilger, M., Lechner, P., Neumayer, R., and Straub, J. 2005. Anti-spam methods: state of the art. Techn. rep., FA384018-1, Institute of Distributed and Multimedia Systems, University of Vienna.
[35]
Garg, A., Battiti, R., and Cascella, R. G. 2006. May I borrow your filter? Exchanging filters to combat spam in a community. In Proceedings of the 20th International Conference on Advanced Information Networking and Applications. Los Alamitos, CA, 489--493.
[36]
Gburzynski, P. and Maitan, J. 2004. Fighting the spam wars: a remailer approach with restrictive aliasing. ACM Trans. Internet Technol. 4, 1, 1--30.
[37]
GFI, 2010. Hosted spam filtering service. http://www.gfi.com/landing/maxmp-hosted-spam-filtering- service.asp?adv=69&loc=643&gclid=CJCy9bqVuKACFUmS3wodhFQaTQ.
[38]
Gnutella. 2001. The gnutella protocol specification. http://www9.limewire.com/developer/gnutella_protocol_0.4.pdf.
[39]
Gomes, L. H., Cazita, C., Almeida, J. M., Almeida, V., and Meira, J. 2004. Characterizing a spam traffic. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (IMC'04). ACM, New York, NY, 356--369.
[40]
Goodman, J., Cormack, G. V., and Heckerman, D. 2007. Spam and the ongoing battle for the inbox. Commun. ACM 50, 2, 24--33.
[41]
Gray, A. and Haahr, M. 2004. Personalized, collaborative spam filtering. In Proceedings of the 1st Conference on Email and Anti-Spam (CEAS).
[42]
Guzella, T. S. and Caminhas, W. M. 2009. A review of machine learning approaches to spam filtering. Expert Syst. Appl. 36, 7, 10206--10222.
[43]
Hayati, P. and Potdar, V. 2008. Evaluation of spam detection and prevention frameworks for email and image spam: a state of art. In Proceedings of the 10th International Conference on Information Integration and Web-Based Applications & Services (iiWAS'08). ACM, New York, NY, 520--527.
[44]
Hershkop, S. and Stolfo, S. J. 2005. Combining email models for false positive reduction. In Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining (KDD'05). ACM, New York, NY, 98--107.
[45]
Hidalgo. 2005. Machine learning for spam detection references. http://www.esi.uem.es/~jmgomez/spam/MLSpamBibliography.html.
[46]
Hunt, R. and Carpinter, J. 2006. Tightening the net: a review of current and next generation spam filtering tools. Comput. Security, 25, 566--578.
[47]
Hsia, J. and Chen, M. 2009. Language-model-based detection cascade for efficient classification of image-based spam e-mail. In Proceedings of the IEEE international Conference on Multimedia and Expo (ICME'09). IEEE Press, Los Alamitos, CA, 1182--1185.
[48]
Janecek, A. G., Gansterer, W. N., and Kumar, K. A. 2008. Multi-level reputation-based greylisting. In Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES'08). Los Alamitos, CA, 10--17.
[49]
Junejo, K. N. and Karim, A. 2007. PSSF: A novel statistical approach for personalized service-side spam filtering. In Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence (WI'07). Los Alamitos, CA, 228--234.
[50]
Jung, J. and Sit, E. 2004. An empirical study of spam traffic and the use of DNS black lists. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (IMC'04). ACM, New York, NY, 370--375.
[51]
Khanal, A., Motlagh, B. S., and Kocak, T. 2007. Improving the efficiency of spam filtering through cache architecture. In Proceedings of the 15th international Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS'07). Los Alamitos, CA, 303--309.
[52]
Khorsi, A. 2007. An overview of content-based spam filtering techniques. Informatica 31, 269--277.
[53]
Kim, J., Dou, D., Liu, H., and Kwak, D. 2007. Constructing a user preference ontology for anti-spam mail systems. In Proceedings of the 20th Conference of the Canadian Society for Computational Studies of Intelligence on Advances in Artificial Intelligence (CAI'07). 272--283.
[54]
Kiran, P. and Atmosukarto, I. 2009. Spam or Not Spam—That is the question. Tech. rep., University of Washington. http://www.cs.washington.edu/homes/indria/research/spamfilter_ravi_indri.pdf.
[55]
Kolcz, A. and Yih, W. 2007. Raising the baseline for high-precision text classifiers. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'07). ACM, New York, NY, 400--409.
[56]
Kong, J. S., Rezaei, B. A., Sarshar, N., Roychowdhury, V. P., and Boykin, P. O. 2006. Collaborative spam filtering using e-mail networks. Computer, 39, 8, 67--73.
[57]
Lee, T. B., Hendler, J., and Lasilla, O. 2001. The semantic web. Scientific Amer. 284, 5, 34--43.
[58]
Levine, J. R. 2005. Experiences with greylisting. In Proceedings of the 2nd Conference on Email and Anti-Spam (CEAS).
[59]
Lawton, G. 2005. Email authentication is here, but has it arrived yet? Computer, 38, 11, 17--19.
[60]
Li, M. and Baker, M. 2005. The Grid Core Technologies. John Wiley & Sons.
[61]
Li, Q. and Mu, B. 2009. A novel method to detect junk mail traffic. In Proceedings of the 9th International Conference on Hybrid Intelligent Systems. Los Alamitos, CA, 129--133.
[62]
Li, K. and Zhong, Z. 2006. Fast statistical spam filter by approximate classifications. In Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS'06/Performance'06). ACM, New York, NY, 347--358.
[63]
Liang, J., Kumar, R., Xi, Y., and Ross, K. W. 2005. Pollution in P2P file sharing systems. In Proceedings of IEEE International Conference on Computer Communications (INFOCOM'05). 1174--1185.
[64]
Liao, L. and Schwenk, J. 2007. End-to-end header protection in signed S/MIME. In Proceedings of the OTM Confederated International Conference on On the Move to Meaningful Internet Systems. 1646--1658.
[65]
Limewire. 2009. Peer To Peer & Torrent Client. http://www.limewire.com.
[66]
Lin, P. L., Huang, J. L., and Chang, T. J. 2004. CAPTCHA-based anti-spam mail model. In Proceedings of the International Conference on Security and Management (SAM'04). 332--338.
[67]
Liu, P. Shi, Y. F. Lau, F. and Cho-Li, W. 2005. Anti-spam grid: a dynamically organized spam filtering infrastructure. In Proceedings of the 5th WSEAS International Conference on Simulation, Modeling and Optimization. 61--66.
[68]
LuO, P., Xiong, H., Lü, K., and Shi, Z. 2007. Distributed classification in peer-to-peer networks. In Proceedings of the 13th ACM SIGKDD International conference on Knowledge Discovery and Data Mining (KDD'07). ACM, New York, NY, 968--976.
[69]
Lueg, C. and Martin, S. 2007. Users dealing with spam and spam filters: Some observations and recommendations. In Proceedings of the 7th ACM SIGCHI New Zealand Chapter's International Conference on Computer-Human Interaction: Design Centered HCI (CHINZ'07). ACM, New York, NY, 67--72.
[70]
Lynam, T. R., Cormack, G. V., and Cheriton, D. R. 2006. On-line spam filter fusion. In Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR'06). ACM, New York, NY, 123--130.
[71]
Ma, W., Tran, D., and Sharma, D. 2009. A novel spam email detection system based on negative selection. In Proceedings of the 4th International Conference on Computer Sciences and Convergence Information Technology (ICCIT'09). Los Alamitos, CA, 987--992.
[72]
Metzger, J., Schillo, M., and Fischer, K. 2003. A multiagent-based peer-to-peer network in java for distributed spam filtering. In Proceedings of the 3rd Central and Eastern European Conference on Multi-Agent Systems (CEEMAS'03). 616--625.
[73]
Microsoft. 2010. Microsoft online services-hosted exchange services. http://www.microsoft.com/online/exchange-hosted-services.mspx.
[74]
Noll, M. G. and Meinel, C. 2008. Building a scalable collaborative web filter with free and open source software. In Proceedings of the IEEE International Conference on Signal Image Technology and Internet Based Systems (SITIS'08). Los Alamitos, CA, 563--571.
[75]
Ohfuku, H. and Matsuura, K. 2006. Integration of Bayesian filter and social network technique for combating spam e-mails better. Trans. Info. Process. Soc. Japan 47, 8, 2548--2555.
[76]
Orgun, B., Dras, M., Nayak, A., and James, G. 2006. Approaches for semantic interoperability between domain ontologies. In Proceedings of the Australasian Ontology Workshop (AOW'06). 41--50.
[77]
Pathak, A., Hu, Y. C., and Mao, Z. M. 2008. Peeking into spammer behavior from a unique vantage point. In Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent (LEET'08). Article 3.
[78]
Paul, P. P., Judge, P., Alperovitch, D., and Yang, W. 2005. Understanding and reversing the profit model of spam. In Proceedings of the Workshop on the Economics of Information Security (WEIS).
[79]
Peterson, P. 2006. E-mail is broke! Authentication can fix it. http://electronicdesign.com/article/embedded/e-mail-is-broke-authentication-can-fix-it12463.aspx.
[80]
Radicati, 2009. Email statistics report, 2009--2013. http://www.radicati.com/wp/wp-content/uploads/2009/05/email-stats-report-exec-summary.pdf.
[81]
Ramachandran, A. and Feamster, N. 2006. Understanding the network-level behavior of spammers. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'06). ACM, New York, NY, 291--302.
[82]
Ramachandran, A., Feamster, N., and Vempala, S. 2007. Filtering spam with behavioral blacklisting. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07). ACM, New York, NY, 342--351.
[83]
Rowstron, A. and Druschel, P. 2001. Pastry: scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms (Middleware'01), Heidelberg, Germany, Lecture Notes in Computer Science, vol. 2218, Springer, 329--350.
[84]
Roman, R., Zhou, J., and Lopez, J. 2005. Protection against spam using pre-challenges. In Proceedings of the 20th International Conference on Information Security. 281--294.
[85]
Salton, G. and Buckley, C. 1988. Term-weighting approaches in automatic text retrieval. Inf. Process. Manage. 24, 5, 513--523.
[86]
SASL. 2010. IETF. RFC 2222. http://www.ietf.org/rfc/rfc2222.txt.
[87]
Scholkopf, B. and Smola, A. J. 2001. Learning with Kernels: Support Vector Machines, Regularization, Optimization and Beyond. MIT Press, Cambridge, MA.
[88]
Schollmeier, R. 2001. A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In Proceedings of the 1st IEEE International Conference on Peer-To-Peer. 101--102.
[89]
Sebastiani, F. 2002. Machine learning in automated text categorization. ACM Comput. Surv. 34, 1, 1--47.
[90]
Sculley, D. and Wachman, G. M. 2007. Relaxed online SVMs for spam filtering. In Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR'07). ACM, New York, NY, 415--422.
[91]
Secureworks. 2009. Spam botnets to watch in 2009. http://www.secureworks.com/research/threats/botnets2009/.
[92]
Shirali-Shahreza, S., and Movaghar, A. 2007. A new anti-spam protocol using CAPTCHA. In Proceedings of the International Conference on Computer Systems and Applications. 234--238.
[93]
Song, Y., Kolcz, A., and Giles, C. L. 2009. Better naive bayes classification for high-precision spam detection. Softw. Pract. Exper. 39, 11, 1003--1024.
[94]
SpamAssasin. 2009. The Apache SpamAssassin project. http://spamassassin.apache.org/.
[95]
SpamCop. 2009. http://www.spamcop.net/.
[96]
Spamhaus. 2009. The Spamhaus project. http://www.spamhaus.org/.
[97]
Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., and Balakrishnan, H. 2001. Chord: A scalable peer-to-peer lookup service for internet applications. SIGCOMM Comput. Commun. Rev. 31, 4, 149--160.
[98]
The Register. 2004. Spammers embrace email authentication. http://www.theregister.co.uk/2004/09/03/email_authentication_spam/.
[99]
Turner, D. and Havey, D. 2004. Controlling spam through lightweight currency. In Proceedings of the International Conference on Computer Sciences.
[100]
Twining R. D., Williamson M. M., Mowbray M., and Rahmouni M. 2004. Email prioritization: reducing delays on legitimate mail caused by junk mail. Tech. rep., HPL-2004-5R1, HP Labs. http://www.hpl.hp.com/techreports/2004/HPL-2004-5R1.pdf.
[101]
von Ahn, L., Blum, M., and Langford, J. 2004. Telling humans and computers apart automatically. Comm. ACM 47, 2, 56--60.
[102]
Wei, C., Sprague, A., and Warner, G. 2009. Clustering malware-generated spam emails with a novel fuzzy string matching algorithm. In Proceedings of the ACM Symposium on Applied Computing (SAC'09). ACM, New York, NY, 889--890.
[103]
Weiss, G. M. and Tian, Y. 2006. Maximizing classifier utility when training data is costly. SIGKDD Explor. Newsl. 8, 2, 31--38.
[104]
Wetzel, R. 2004. Spam fighting business models-who wins, who loses. Bus. Comm. Rev. 34, 24--9.
[105]
Witten, H. and Eibe, F. 2005. Data Mining: Practical Machine Learning Tools and Techniques, 2nd Ed., Morgan Kaufmann, San Francisco.
[106]
Wu, C. 2009. Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks. Expert Syst. Appl. 36, 3, 4321--4330.
[107]
Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., and Osipkov, I. 2008. Spamming botnets: Signatures and characteristics. In Proceedings of the ACM Conference on Data Communication (SIGCOMM). ACM, New York, NY, 171--182.
[108]
Yan, J. and El-Ahmad, A. S. 2008. A low-cost attack on a microsoft CAPTCHA. In Proceedings of the 15th ACM Conference On Computer And Communications Security (CCS'08). ACM, New York, NY, 543--554.
[109]
Yang, Z. Nie, X. Xu, W., and Guo, J. 2006. An approach to spam detection by naive Bayes ensemble based on decision induction. In Proceedings of the 6th IEEE International Conference on Intelligent Systems Design and Applications. 861--866.
[110]
Yang, Y. and Pedersen, J. O. 1997. A comparative study on feature selection in text categorization. In Proceedings of the 14th International Conference on Machine Learning (ICML'97). 412--420.
[111]
Yeh, C., Mao, C., Lee, H., and Chen, T. 2007. Adaptive e-mail intention finding mechanism based on e-mail words social networks. In Proceedings of the Workshop on Large Scale Attack Defense (LSAD'07). ACM, New York, NY, 113--120.
[112]
Youn, S. and McLeod, D. 2009a. Spam decisions on gray e-mail using personalized ontologies. In Proceedings of the ACM Symposium on Applied Computing (SAC'09). ACM, New York, NY, 1262--1266.
[113]
Youn, S. and Mcleod, D. 2009b. Improved spam filtering by extraction of information from text embedded image e-mail. In Proceedings of the ACM Symposium on Applied Computing (SAC'09). ACM, New York, NY, 1754--1755.
[114]
Yuan, Z., Zhang, Q., Li, D., and Liu, Y. 2007. Research of anti-spam application architecture based on semantic grid. In Proceedings of the 2nd International Conference on Innovative Computing, Information and Control. Los Alamitos, CA, 491--491.
[115]
Zhang, L., Zhu, J., and Yao, T. 2004. An evaluation of statistical spam filtering techniques. ACM Trans. Asian Lang. Inf. Process. 3, 4, 243--269.
[116]
Zhong, Z., Ramaswamy, L., and Li, K. 2008. ALPACAS: A large-scale privacy-aware collaborative anti-spam system. In Proceedings of the 27th Conference on Computer Communications. 556--564.
[117]
Zhou, F., Zhuang, L., Zhao, B. Y., Huang, L., Joseph, A. D., and Kubiatowicz, J. 2003. Approximate object location and spam filtering on peer-to-peer systems. In Proceedings of the ACM/IFIP/USENIX International Conference on Middleware (Middleware'03). Verlag, Berlin, 1--20.
[118]
Zinman, A. and Donath, J. 2007. Is Britney Spears spam? In Proceedings of the 4th International Conference on Email and Anti-Spam (CEAS).

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 44, Issue 2
February 2012
132 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/2089125
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Accepted: 01 July 2010
Revised: 01 March 2010
Received: 01 November 2009
Published: 05 March 2008
Published in CSUR Volume 44, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Spam filtering
  2. architectures
  3. classifiers
  4. distributed computing
  5. grid
  6. peer-to-peer
  7. semantic

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)4
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media