-
1
-
-
33645212786
-
"Legal and technical responses to unsolicited commercial e-mail ('spam')"
-
accessed Aug. 1, 2005
-
P. Dougan, "Legal and technical responses to unsolicited commercial e-mail ('spam')," 2001; http://www.strath.ac.uk/Other/staffclub/ web2law/spam.pdf, accessed Aug. 1, 2005.
-
(2001)
-
-
Dougan, P.1
-
2
-
-
33645225731
-
"Why canning "spam" is a bad idea"
-
July 26, accessed Aug. 1, 2005
-
C.W. Crews, Jr., "Why canning "spam" is a bad idea," Cato Policy Analysis, no. 408, July 26, 2001; http://www.cato.org/pubs/pas/pa408.pdf, accessed Aug. 1, 2005.
-
(2001)
Cato Policy Analysis
, Issue.408
-
-
Crews Jr., C.W.1
-
3
-
-
7244254280
-
"Spam and the social technical gap"
-
Oct
-
B. Whitworth and E. Whitworth, "Spam and the social technical gap," IEEE Computer, vol. 37, no. 10, pp. 38-45, Oct. 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.10
, pp. 38-45
-
-
Whitworth, B.1
Whitworth, E.2
-
4
-
-
33645226911
-
"Increasing spam threat from proxy hijackers"
-
accessed Aug. 1
-
"Increasing spam threat from proxy hijackers;" http://www.spamhaus.org/news.lasso?article=156, accessed Aug. 1, 2005.
-
(2005)
-
-
-
5
-
-
33645217424
-
"Spammer says "Uncle" to AOL"
-
accessed Aug. 1
-
M. Krochmal, "Spammer says "Uncle" to AOL;" http://content.techweb.com/wire/story/TWB19971218S0007, accessed Aug. 1, 2005.
-
(2005)
-
-
Krochmal, M.1
-
6
-
-
33645213143
-
"America Online announces breakthroughs in fight against spam"
-
Dec. 27, accessed Aug. 1 2005
-
"America Online announces breakthroughs in fight against spam," Dec. 27, 2004; http://media.timewarner.com/media/newmedia/ cb_press_view.cfm?release_num=55254331, accessed Aug. 1, 2005.
-
(2004)
-
-
-
7
-
-
33645214533
-
Spam: The serial ROI killer
-
Res. note E50, June 2004; accessed Aug. 1
-
Spam: The serial ROI killer, Res. note E50, June 2004; http://www.nucleusresearch.com/research/e50.pdf, accessed Aug. 1, 2005.
-
(2005)
-
-
-
8
-
-
33645217425
-
"Weeding in the garden of good email"
-
Jan. 31
-
L. Walker, "Weeding in the garden of good email", Washington Post, pp. E.01, Jan. 31, 2002.
-
(2002)
Washington Post
-
-
Walker, L.1
-
9
-
-
33645235432
-
"Spam issues in developing countries
-
OECD, Rep. JT00185109, May 26, 2005; accessed Aug. 1
-
"Spam issues in developing countries, OECD, Rep. JT00185109, May 26, 2005; http://www.oecd.org/dataoecd/5/47/34935342.pdf, accessed Aug. 1, 2005.
-
(2005)
-
-
-
10
-
-
33645213796
-
-
Statistical data on the Open Relay Database web site
-
Statistical data on the Open Relay Database web site; http://ordb.org/ statistics/.
-
-
-
-
11
-
-
33645211320
-
-
Quick FAQ, Coalition against Unsolicited Commercial Email; accessed Aug. 1
-
Quick FAQ, Coalition against Unsolicited Commercial Email; http://www. cauce.org/about/faq.shtml, accessed Aug. 1, 2005.
-
(2005)
-
-
-
12
-
-
33645243727
-
"Spam on the Internet: Is it here to stay or can it be eradicated?"
-
Joint Information Systems Committee, Techwatch Pap, TS-04-01; accessed Aug. 1
-
S. de Freitas and M. Levene, "Spam on the Internet: Is it here to stay or can it be eradicated?" Joint Information Systems Committee, Techwatch Pap, TS-04-01; http://www.jisc.ac.uk/uploaded_documents/ ACF11A8.pdf, accessed Aug. 1, 2005.
-
(2005)
-
-
de Freitas, S.1
Levene, M.2
-
13
-
-
33645234826
-
"Technical solutions for controlling spam"
-
Melbourne, Australia, Sept. 4-6, 2002; accessed Aug. 1
-
S. Hird, "Technical solutions for controlling spam," in Proc. AUUG 2002, Melbourne, Australia, Sept. 4-6, 2002; http://security.dstc. edu.au/papers/technical_spam.pdf, accessed Aug. 1, 2005.
-
(2005)
Proc. AUUG 2002
-
-
Hird, S.1
-
14
-
-
33645232865
-
-
ROKSO, Register of Known Spam Operations accessed Aug. 1
-
ROKSO, Register of Known Spam Operations; http://www.spamhaus.org/rokso/ index.lasso, accessed Aug. 1, 2005.
-
(2005)
-
-
-
15
-
-
33645216296
-
"The Spammer's Compendium"
-
last updated on Apr. 15, 2005; accessed Aug. 1
-
J. Graham-Cumming, "The Spammer's Compendium," last updated on Apr. 15, 2005; http://www.jgc.org/tsc/, accessed Aug. 1, 2005.
-
(2005)
-
-
Graham-Cumming, J.1
-
16
-
-
38649133079
-
"Personalised, collaborative spam filtering"
-
Mountain View, CA, 2004; accessed Aug. 1
-
A. Gray and M. Haahr, "Personalised, collaborative spam filtering," in Proc. First Conf. on Email and Anti-Spam (CEAS 2004, Mountain View, CA, 2004; http://www.ceas.cc/papers-2004/132.pdf, accessed Aug. 1, 2005.
-
(2005)
Proc. First Conf. on Email and Anti-Spam (CEAS 2004)
-
-
Gray, A.1
Haahr, M.2
-
17
-
-
33645211679
-
-
Teergrubing FAQ; accessed Aug. 1
-
L. Donnerhacke, Teergrubing FAQ; http://www.iks-jena.de/mitarb/lutz/ usenet/teergrube.en.html, accessed Aug. 1, 2005.
-
(2005)
-
-
Donnerhacke, L.1
-
18
-
-
33645239438
-
"Resisting SPAM delivery by TCP damping"
-
Mountain View, CA, 2004; accessed Aug. 1
-
K. Li, C. Pu, and M. Ahamad, "Resisting SPAM delivery by TCP damping" in Proc. First Conf. on Email and Anti-Spam (CEAS 2004), Mountain View, CA, 2004; http://www.cs.uga.edu/~kangli/src/ ceas2004_kangli.pdf, accessed Aug. 1, 2005.
-
(2005)
Proc. First Conf. on Email and Anti-Spam (CEAS 2004)
-
-
Li, K.1
Pu, C.2
Ahamad, M.3
-
19
-
-
2642556866
-
"The next step in the spam control war: Greylisting"
-
accessed Aug. 1
-
E. Harris, "The next step in the spam control war: Greylisting;" http://projects.puremagic.com/greylisting/ whitepaper.html, accessed Aug. 1, 2005.
-
(2005)
-
-
Harris, E.1
-
20
-
-
33645215385
-
"Greylisting performance"
-
Aug. 1 accessed
-
A. Jones, "Greylisting performance;" http://users.aber.ac.uk/ auj/spam/greyperf.shtml, accessed Aug. 1, 2005.
-
(2005)
-
-
Jones, A.1
-
21
-
-
34548160925
-
"Email prioritization: Reducing delays on legitimate mail caused by junk mail"
-
Hewlett-Packard Rep. HPL-2004-5R1, 2004; accessed Aug. 1
-
R.D. Twining, M.M. Williamson, M. Mowbray, and M. Rahmouni, "Email prioritization: Reducing delays on legitimate mail caused by junk mail," Hewlett-Packard, Rep. HPL-2004-5R1, 2004; http://www.hpl. hp.com/techreports/2004/HPL-2004-5R1.pdf, accessed Aug. 1, 2005.
-
(2005)
-
-
Twining, R.D.1
Williamson, M.M.2
Mowbray, M.3
Rahmouni, M.4
-
22
-
-
84904812564
-
"Experiences with greylisting"
-
presented at Second Conf. on Email and Anti-Spam, CEAS 2005; accessed Aug. 1
-
J. Levine, "Experiences with greylisting," presented at Second Conf. on Email and Anti-Spam, CEAS 2005; http://ceas.cc/papers-2005/ 120.pdf, accessed Aug. 1, 2005.
-
(2005)
-
-
Levine, J.1
-
23
-
-
33645215920
-
"Symantec slows spam at the edge"
-
Apr. 11
-
J. Snyder, "Symantec slows spam at the edge," Network World, Apr. 11, 2005.
-
(2005)
Network World
-
-
Snyder, J.1
-
24
-
-
33645216912
-
"Shall we stop all unsolicited email messages?"
-
Mountain View, CA, 2004; accessed Aug. 1
-
R. Dai and K. Li "Shall we stop all unsolicited email messages?" in Proc. First Conference on Email and Anti-Spam (CEAS 2004), Mountain View, CA, 2004; http://www.ceas.cc/papers-2004/189.pdf, accessed Aug. 1, 2005.
-
(2005)
Proc. First Conference on Email and Anti-Spam (CEAS 2004)
-
-
Dai, R.1
Li, K.2
-
25
-
-
33645228113
-
-
Email communication posted online; accessed Aug. 1
-
J. Levine, Email communication posted online; http://www.politechbot.com/ p-04746.html, accessed Aug. 1, 2005.
-
(2005)
-
-
Levine, J.1
-
26
-
-
33645221404
-
"Proper principles for Challenge/Response anti-spam systems"
-
accessed Aug. 1
-
B. Templeton, "Proper principles for Challenge/Response anti-spam systems;" http://www.templetons.com/brad/spam/ challengeresponse.html, accessed Aug. 1, 2005.
-
(2005)
-
-
Templeton, B.1
-
27
-
-
84943235829
-
"Pricing via processing or combatting junk mail"
-
E.F. Brickell, Ed
-
C. Dwork, and M. Naor, "Pricing via processing or combatting junk mail," in Advances in Cryptology - CRYPTO '92, E.F. Brickell, Ed., 1992, pp.139- 147.
-
(1992)
Advances in Cryptology - CRYPTO '92
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
29
-
-
55849112143
-
"'Proof-of-Work' proves not to work"
-
version 0.2, September 2004; accessed Aug. 1
-
B. Laurie and R. Clayton, "'Proof-of-Work' proves not to work", version 0.2, September 2004; http://www.cl.cam.ac.uk/users/rnc1/ proofwork2.pdf, accessed Aug. 1, 2005.
-
(2005)
-
-
Laurie, B.1
Clayton, R.2
-
30
-
-
3042781459
-
"Privacy recovery with disposable email addresses"
-
J.-M. Seigneur and C.D. Jensen, "Privacy recovery with disposable email addresses," IEEE Security & Privacy Mag., vol. 1, no. 6, pp. 35-39, 2003.
-
(2003)
IEEE Security & Privacy Mag.
, vol.1
, Issue.6
, pp. 35-39
-
-
Seigneur, J.-M.1
Jensen, C.D.2
-
31
-
-
33645223995
-
"DiffMail: A differentiated message delivery architecture to control spam"
-
accessed Aug. 1
-
Z. Duan, Y. Dong, and K. Gopalan, "DiffMail: A differentiated message delivery architecture to control spam;" http://www.cs.fsu. edu/research/reports/TR-041025.pdf, accessed Aug. 1, 2005.
-
(2005)
-
-
Duan, Z.1
Dong, Y.2
Gopalan, K.3
-
32
-
-
33645214858
-
-
Prepared Statement of the Federal Trade Commission on "Unsolicited Commercial Email" before the Committee on Commerce, Science and Transportation, U.S. Senate, Washington, DC, May 21, 2003; accessed Aug. 1
-
Prepared Statement of the Federal Trade Commission on "Unsolicited Commercial Email" before the Committee on Commerce, Science and Transportation, U.S. Senate, Washington, DC, May 21, 2003; http://www. ftc.gov/os/2003/05/spamtestimony.pdf, accessed Aug. 1, 2005.
-
(2005)
-
-
-
33
-
-
33645229435
-
"Best way to end spam"
-
accessed Aug. 1
-
B. Templeton, "Best way to end spam;" http://www.templetons. com/brad/spam/endspam.html, accessed Aug. 1, 2005.
-
(2005)
-
-
Templeton, B.1
-
34
-
-
33645219812
-
"Spammers hijack Sender ID"
-
Sept. 9
-
T. Claburn, "Spammers hijack Sender ID," Information Week, Sept. 9, 2004
-
(2004)
Information Week
-
-
Claburn, T.1
-
35
-
-
33645215919
-
"Important considerations for implementers of SPF and/or Sender ID"
-
accessed Aug. 1
-
M. W. Wong, "Important considerations for implementers of SPF and/or Sender ID;" http://www.maawg.org/about/whitepapers/spf_sendID/, accessed Aug. 1, 2005.
-
(2005)
-
-
Wong, M.W.1
-
36
-
-
33645239437
-
"Beyond identity: Addressing problems that persist in an electronic mail system with reliable sender identification"
-
Mountain View, CA, 2004; accessed Aug. 1
-
B. Watson, "Beyond identity: Addressing problems that persist in an electronic mail system with reliable sender identification," in Proc. First Conf. on Email and Anti-Spam (CEAS 2004), Mountain View, CA, 2004; http://www.ceas.cc/papers-2004/140.pdf, accessed Aug. 1, 2005.
-
(2005)
Proc. First Conf. on Email and Anti-Spam (CEAS 2004)
-
-
Watson, B.1
-
37
-
-
33645232678
-
"The advent of spim"
-
Pew Internet Report, accessed Aug
-
Pew Internet Report, "The advent of spim" http://www. pewinternet.org/PPF/p/1052/pipcomments.asp, accessed Aug. 1, 2005.
-
, vol.1
, pp. 2005
-
-
-
38
-
-
33645218140
-
"Against Internet Messaging Company and sending more than 1.5 million spam messages"
-
USAO/CDCA, press release; accessed Aug. 1
-
"Against Internet Messaging Company and sending more than 1.5 million spam messages," USAO/CDCA, press release; http://www.usdoj.gov/usao/cac/pr2005/034.html, accessed Aug. 1, 2005.
-
(2005)
-
-
-
39
-
-
33645231242
-
"First empirical global spam study indicates more than 80 percent of mobile phone users receive spam"
-
accessed Aug. 1
-
"First empirical global spam study indicates more than 80 percent of mobile phone users receive spam"; http://www.bmdwireless.com/ main.php?content=newsflash_02200509, accessed Aug. 1, 2005.
-
(2005)
-
-
-
41
-
-
33645226069
-
-
Open Source Technology Group
-
Open Source Technology Group, 2006; http://sourceforge.net/projects/ tarproxy.
-
(2006)
-
-
-
42
-
-
33645213142
-
-
Return Path, Inc. www.bonded-sender.com
-
Return Path, Inc., 2006; www.bonded-sender.com.
-
(2006)
-
-
-
43
-
-
33645215572
-
-
School of Computer Science, Carnegie-Mellon University
-
School of Computer Science, Carnegie-Mellon University, 2000-2005; http://www.captcha.net/.
-
(2000)
-
-
|