References
[1] "Email Statistics Report, 2014-2018." Email Statistics Report, 2014-2018. Ed. Sara Radicati. The Radicati Group, Inc., 14 Apr. 2014. Web. 25 Apr. 2014. <http://www.radicati.com/wp/wp-content/uploads/2014/04/Email-Statistics-Report-2014-2018- Executive-Summary.pdf>.
[2] "Kaspersky Security Bulletin. Spam Evolution 2013." Securelist.com. Kaspersky Lab, 23 Jan. 2014. Web. 25 Apr. 2014. <http://www.securelist.com/en/analysis/204792322/Kaspersky_Security_Bulletin_Spam_evolution_2013#01>.
[3] "Minimization of Costs Caused by Spam." Antispameurope For CEOs. Antispameurope, n.d. Web. 25 Apr. 2014. <http://www.antispameurope.com/en/antispameurope-for-ceos/costs>.
[4] "Spam Protection Technologies." Securelist.com. Securelist, n.d. Web. 30 Apr. 2014. <http://www.securelist.com/en/threats/spam?chapter=97>.
[5] A. Jain, R. Duin, and J. Mao. Statistical pattern recognition: A review. IEEE Trans. PAMI, 22(1):4–37, 2000.
[6] A. Ramachandran, D. Dagon, and N. Feamster, “Can DNS-based blacklists keep up with bots?,” in CEAS 2006. The Second Conference on Email and Anti-Spam, 2006.
[7] G. Cormack, “Email spam filtering: A systematic review,” Foundations and Trends in Information Retrieval, vol. 1, no. 4, pp. 335–455, 2008.
[8] Christina V, Karpagavalli S and Suganya G (2010), ‘A Study on Email Spam Filtering Techniques’, International Journal of Computer Applications (0975 – 8887), Vol. 12- No. 1, pp. 7-9
[9] "Entropy and Information Gain." . Dip. di Matematica Pura ed Applicata, n.d. Web. 2 May 2014. <http://www.math.unipd.it/~aiolli/corsi/0708/IR/Lez12.pdf>.
[2] "Kaspersky Security Bulletin. Spam Evolution 2013." Securelist.com. Kaspersky Lab, 23 Jan. 2014. Web. 25 Apr. 2014. <http://www.securelist.com/en/analysis/204792322/Kaspersky_Security_Bulletin_Spam_evolution_2013#01>.
[3] "Minimization of Costs Caused by Spam." Antispameurope For CEOs. Antispameurope, n.d. Web. 25 Apr. 2014. <http://www.antispameurope.com/en/antispameurope-for-ceos/costs>.
[4] "Spam Protection Technologies." Securelist.com. Securelist, n.d. Web. 30 Apr. 2014. <http://www.securelist.com/en/threats/spam?chapter=97>.
[5] A. Jain, R. Duin, and J. Mao. Statistical pattern recognition: A review. IEEE Trans. PAMI, 22(1):4–37, 2000.
[6] A. Ramachandran, D. Dagon, and N. Feamster, “Can DNS-based blacklists keep up with bots?,” in CEAS 2006. The Second Conference on Email and Anti-Spam, 2006.
[7] G. Cormack, “Email spam filtering: A systematic review,” Foundations and Trends in Information Retrieval, vol. 1, no. 4, pp. 335–455, 2008.
[8] Christina V, Karpagavalli S and Suganya G (2010), ‘A Study on Email Spam Filtering Techniques’, International Journal of Computer Applications (0975 – 8887), Vol. 12- No. 1, pp. 7-9
[9] "Entropy and Information Gain." . Dip. di Matematica Pura ed Applicata, n.d. Web. 2 May 2014. <http://www.math.unipd.it/~aiolli/corsi/0708/IR/Lez12.pdf>.