PUMA publications for /author/Jussara%20M.%20Almeidahttps://puma.uni-kassel.de/author/Jussara%20M.%20AlmeidaPUMA RSS feed for /author/Jussara%20M.%20Almeida2024-03-28T19:39:39+01:00Comparative Graph Theoretical Characterization of Networks of Spam and Legitimate Emailhttps://puma.uni-kassel.de/bibtex/2fff54b482dc6bbd160a270b0f494c149/hothohotho2007-03-13T17:55:17+01:00email graph network spam <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Luiz H. Gomes" itemprop="url" href="/author/Luiz%20H.%20Gomes"><span itemprop="name">L. Gomes</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Rodrigo B. Almeida" itemprop="url" href="/author/Rodrigo%20B.%20Almeida"><span itemprop="name">R. Almeida</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Luis M. A. Bettencourt" itemprop="url" href="/author/Luis%20M.%20A.%20Bettencourt"><span itemprop="name">L. Bettencourt</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Virgilio Almeida" itemprop="url" href="/author/Virgilio%20Almeida"><span itemprop="name">V. Almeida</span></a></span>, и <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Jussara M. Almeida" itemprop="url" href="/author/Jussara%20M.%20Almeida"><span itemprop="name">J. Almeida</span></a></span>. </span>(<em><span>2005<meta content="2005" itemprop="datePublished"/></span></em>)Tue Mar 13 17:55:17 CET 2007Comparative Graph Theoretical Characterization of Networks of Spam and Legitimate Email2005email graph network spam Email is an increasingly important and ubiquitous means of communication, both facilitating contact between private individuals and enabling rises in the productivity of organizations. However the relentless rise of automatic unauthorized emails, a.k.a. spam is eroding away much of the attractiveness of email communication. Most of the attention dedicated to date to spam detection has focused on the content of the emails or on the addresses or domains associated with spam senders. Although methods based on these - easily changeable - identifiers work reasonably well they miss on the fundamental nature of spam as an opportunistic relationship, very different from the normal mutual relations between senders and recipients of legitimate email. Here we present a comprehensive graph theoretical analysis of email traffic that captures these properties quantitatively. We identify several simple metrics that serve both to distinguish between spam and legitimate email and to provide a statistical basis for models of spam traffic.[physics/0504025] Comparative Graph Theoretical Characterization of Networks of Spam and Legitimate Email