4BHATFACHARYYA M, SCHULTZ M G, ESKIN E, et al. MET: an experimental system for malicious email tracking[ C ]//Proceedings of the 2002 New Security Paradigms Workshop. Virginia Beach, VA, USA, 2002: 3- 10.
5HERSHKOP S. Behavior-based email analysis with application to spam detection[ D]. New York, USA: Columbia University, 2006.
6MARTIN S, SEWANI A, NELSON B, et al. Analyzing behavioral features for email classification [ C ]//Proceedings of Conference on Email and Anti Spare. Stanford University, USA, 2005.
7STOLFO S J, HERSHKOP S, HU C W, et al. Behavior- based modeling and its application to email analysis [ J ]. ACM Transactions on Internet Technology, 2006, 6 ( 2 ) : 187-221.
8BRENDEL R, KRAWCZYK H. Detection methods of dynamic spammers' behavior[ C]//Proceedings of 2nd International Conference on Dependability of Computer Systems. Washington, DC, USA: IEEE Computer Society, 2007 : 145-152.
9RAMACHANDRAN A, FEAMSTER N. Understanding the network-level behavior of spammers [ C ]//Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York, USA: ACM, 2006: 291-302.
10SPAM LAWS. The CAN-SPAM Act of 2003 [ EB/OL]. [ 2009-11-07 ]. http ://www. spamlaws, coln/federal/index. shtml.