메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 547-556

Securing email archives through user modeling

Author keywords

[No Author keywords available]

Indexed keywords

ADMINISTRATIVE DATA PROCESSING; DIGITAL LIBRARIES; INFORMATION SERVICES; PROBABILITY; SECURITY OF DATA; USER INTERFACES;

EID: 33846281237     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2005.50     Document Type: Conference Paper
Times cited : (2)

References (27)
  • 1
    • 0003964874 scopus 로고
    • Next-Generation Intrusion Detection Expert System (NIDES): A Summary
    • Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, May
    • D. Anderson, T. Frivold, and A. Valdes. Next-Generation Intrusion Detection Expert System (NIDES): A Summary. Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, May 1995.
    • (1995)
    • Anderson, D.1    Frivold, T.2    Valdes, A.3
  • 2
    • 33747043555 scopus 로고    scopus 로고
    • Apache Software Foundation
    • Apache Software Foundation. SpamAssassin, 2005. http://spamassassin. apache.org.
    • (2005) SpamAssassin
  • 4
    • 1642409662 scopus 로고    scopus 로고
    • DEMIDS: Misuse Detection System Database System
    • C. Chung, M. Gertz, and K. Levitt. DEMIDS: Misuse Detection System Database System. In IICIS, 1999.
    • (1999) IICIS
    • Chung, C.1    Gertz, M.2    Levitt, K.3
  • 7
    • 33846287038 scopus 로고    scopus 로고
    • M. Delany. Internet draft: Domain-based email authentication using public-keys advertised in the DNS (DomainKeys), March 2005. http://www.ietf.org/ internetdrafts/draft-delany-domainkeys-base-02.txt.
    • M. Delany. Internet draft: Domain-based email authentication using public-keys advertised in the DNS (DomainKeys), March 2005. http://www.ietf.org/ internetdrafts/draft-delany-domainkeys-base-02.txt.
  • 8
    • 0012297627 scopus 로고    scopus 로고
    • Computer Intrusion Detection Based on Bayes Factors for Comparing Command Transition Probabilities
    • Technical report, National Institute of Statistical Sciences NISS
    • W. DuMouchel. Computer Intrusion Detection Based on Bayes Factors for Comparing Command Transition Probabilities. Technical report, National Institute of Statistical Sciences (NISS), 1999.
    • (1999)
    • DuMouchel, W.1
  • 12
    • 33846266028 scopus 로고    scopus 로고
    • Request for Comment (RFC) 2821: Simple Mail Transfer Protocol
    • April
    • J. Klensin. Request for Comment (RFC) 2821: Simple Mail Transfer Protocol, April 2001.
    • (2001)
    • Klensin, J.1
  • 16
    • 33846318730 scopus 로고    scopus 로고
    • Request for Comment (RFC) 1939: Post Office Protocol-Version 3
    • May
    • J. Myers and M. Rose. Request for Comment (RFC) 1939: Post Office Protocol-Version 3, May 1996.
    • (1996)
    • Myers, J.1    Rose, M.2
  • 17
    • 35048851006 scopus 로고    scopus 로고
    • Anomaly Detection Using Layered Networks Based on Eigen Cooccurrence Matrix
    • RAID 2004 Proceedings, of, Springer-Verlag
    • M. Oka, Y. Oyama, H. Abe, and K. Kato. Anomaly Detection Using Layered Networks Based on Eigen Cooccurrence Matrix. In RAID 2004 Proceedings, volume 3224 of LNCS, pages 223-237. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3224 , pp. 223-237
    • Oka, M.1    Oyama, Y.2    Abe, H.3    Kato, K.4
  • 18
    • 1842643238 scopus 로고    scopus 로고
    • Request for Comment (RFC) 2633: S/MIME Version 3 Message Specification
    • June
    • B. Ramsdell. Request for Comment (RFC) 2633: S/MIME Version 3 Message Specification, June 1999.
    • (1999)
    • Ramsdell, B.1
  • 23
    • 33846306906 scopus 로고    scopus 로고
    • The Spamhaus Project
    • The Spamhaus Project, http://www.spamhaus.org, 2005.
    • (2005)
  • 24
    • 33846287403 scopus 로고    scopus 로고
    • University of Washington
    • University of Washington. IMAP information center. http://www.washington. edu/imap/, 2005.
    • (2005) IMAP information center
  • 25
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous Payload-based Network Intrusion Detection
    • RAID 2004 Proceedings, of, Springer-Verlag
    • K. Wang and S. J. Stolfo. Anomalous Payload-based Network Intrusion Detection. In RAID 2004 Proceedings, volume 3224 of LNCS, pages 203-222. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3224 , pp. 203-222
    • Wang, K.1    Stolfo, S.J.2
  • 26
    • 33846309063 scopus 로고    scopus 로고
    • M. Wong and W. Schlitt. Internet draft: Sender policy framework (SPF) for authorizing use of domains in email, version 1, June 6 2005. http://www.ietf.org/internetdrafts/draft-schlitt-spf-classic-02.txt.
    • M. Wong and W. Schlitt. Internet draft: Sender policy framework (SPF) for authorizing use of domains in email, version 1, June 6 2005. http://www.ietf.org/internetdrafts/draft-schlitt-spf-classic-02.txt.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.