I. Androutsopoulos, J. Koutsias, K. Chandrinos, G. Paliouras, and C. Spyropoulos, An evaluation of naive bayesian anti-spam filtering, 2000.

A. Bergholz, J. Chang, G. Paaß, F. Reichartz, and S. Strobel, Improved phishing detection using model-based features, Proc. of the Conference on Email and Anti-Spam (CEAS), 2008.

D. Bernstein, Internet mail, 2000.

D. Crocker, RFC822: Standard for ARPA Internet Text Messages, 1982.

M. Delany, Domain-Based Email Authentication Using Public Keys Advertised, the DNS (DomainKeys), 2007.

H. Drucker, D. Wu, and V. Vapnik, Support vector machines for spam categorization, IEEE Transactions on Neural Networks, vol.10, issue.5, pp.1048-1054, 1999.
DOI : 10.1109/72.788645

Z. Duan, Y. Dong, and K. Gopalan, Diffmail: A Differentiated Message Delivery Architecture to Control Spam, 2004.

D. Erickson, M. Casado, and N. Mckeown, The Effectiveness of Whitelisting: a User-Study, Proc. of Conference on Email and Anti-Spam, 2008.

C. Fleizach, G. Voelker, and S. Savage, Slicing spam with occamâ ? A ´ Zs razor, 2007.

S. Garriss, M. Kaminsky, M. Freedman, B. Karp, D. Mazieres et al., Reliable email, Proc. of NSDI, 2006.

S. Hao, N. Syed, N. Feamster, A. Gray, and S. Krasser, Detecting spammers with SNARE: Spatio-temporal network-level automatic reputation engine, Proc. of the 18th conference on USENIX security symposium, pp.101-118, 2009.

J. Jung and E. Sit, An empirical study of spam traffic and the use of DNS black lists, Proceedings of the 4th ACM SIGCOMM conference on Internet measurement , IMC '04, pp.370-375, 2004.
DOI : 10.1145/1028788.1028838

C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker et al., Spamalytics: An empirical analysis of spam marketing conversion, Proceedings of the 15th ACM conference on Computer and communications security, pp.3-14, 2008.

D. Lowd and C. Meek, Good word attacks on statistical spam filters, Proc. of the second conference on email and anti-spam (CEAS), pp.125-132, 2005.

R. Mastaler, Tagged message delivery agent

M. Paganini, ASK: active spam killer, Proc. 2003 Usenix Annual Technical Conference, 2003.

A. Pathak, Y. Hu, and Z. Mao, Peeking into spammer behavior from a unique vantage point, Proc. of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pp.1-9, 2008.

A. Ramachandran, N. Feamster, and S. Vempala, Filtering spam with behavioral blacklisting, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.342-351, 2007.
DOI : 10.1145/1315245.1315288

M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz, A Bayesian approach to filtering junk e-mail, Learning for Text Categorization: Papers from the 1998 workshop, 1998.

G. Sakkis, I. Androutsopoulos, G. Paliouras, V. Karkaletsis, C. Spyropoulos et al., A memory-based approach to anti-spam filtering for mailing lists, Information Retrieval, vol.6, issue.1, pp.49-73, 2003.
DOI : 10.1023/A:1022948414856

B. Stone-gross, T. Holz, G. Stringhini, and G. Vigna, The underground economy of spam: A botmaster ? 2019s perspective of coordinating large-scale spam campaigns, USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2011.

M. Wong and W. Schlitt, Sender policy framework (SPF) for authorizing use of domains in e-mail, version 1, 2006.
DOI : 10.17487/rfc4408