-
1
-
-
34247636921
-
-
Spam Archive. Donate your spam to science. Available from: http://www.spamarchive.org/.
-
-
-
-
2
-
-
34247637731
-
-
D. Bernstein. Internet Mail 2000 (IM2000). Available from: http://cr.yp.to/im2000.html.
-
-
-
-
3
-
-
80052862897
-
Rethinking the design of the internet: the end-to-end arguments vs. the brave new world
-
Blumenthal M., and Clark D. Rethinking the design of the internet: the end-to-end arguments vs. the brave new world. ACM Transactions on Internet Technology 1 1 (2001)
-
(2001)
ACM Transactions on Internet Technology
, vol.1
, Issue.1
-
-
Blumenthal, M.1
Clark, D.2
-
4
-
-
34247611642
-
-
A. Broder, M. Mitzenmacher, Network applications of bloom filters: a survey, in: Proceedings of the 40th Annual Allerton Conference on Communication, Control, and Computing, 2002.
-
-
-
-
5
-
-
34247630847
-
-
X. Carreras, L. Márquez, Boosting trees for anti-spam email filtering, in: Proceedings of RANLP-01, 4th International Conference on Recent Advances in Natural Language Processing, Tzigov Chark, BG, 2001.
-
-
-
-
7
-
-
34247591654
-
-
Sendmail Consortium. Welcome to sendmail.org. Available from: http://www.sendmail.org/.
-
-
-
-
8
-
-
34247596685
-
-
IBM Corporation. Fair use of unsolicited commercial email FairUCE, 2004. Available from: http://www.alphaworks.ibm.com/tech/fairuce.
-
-
-
-
10
-
-
21644483570
-
Internet message access protocol - version 4rev1
-
Crispin M. Internet message access protocol - version 4rev1. IETF RFC3501 (2003)
-
(2003)
IETF RFC3501
-
-
Crispin, M.1
-
11
-
-
34247557256
-
-
M. Delany, Domain-based email authentication using public-keys avertised in the DNS (domainkeys). Internet Draft, August 2004. Work in Progress.
-
-
-
-
12
-
-
34247572671
-
-
Z. Duan, K. Gopalan, Y. Dong, Receiver-driven extensions to SMTP. Internet Draft, July 2006. Work in Progress.
-
-
-
-
13
-
-
34247604734
-
-
Z. Duan, K. Gopalan, X. Yuan, Behavioral characteristics of spammers and their network reachability properties. Technical Report TR-060602, Department of Computer Science, Florida State University, June 2006.
-
-
-
-
14
-
-
34247646250
-
-
Ferris Research. Spam control research reports. Available from: http://www.ferris.com/.
-
-
-
-
15
-
-
29544447597
-
Fighting the spam wars: a remailer approach with restrictive aliasing
-
Gburzynski P., and Maitan J. Fighting the spam wars: a remailer approach with restrictive aliasing. ACM Transactions on Internet Technology 4 1 (2004) 1-30
-
(2004)
ACM Transactions on Internet Technology
, vol.4
, Issue.1
, pp. 1-30
-
-
Gburzynski, P.1
Maitan, J.2
-
16
-
-
3242796620
-
-
J. Goodman, R. Rounthwaite, Stopping outgoing spam, in: Proceedings of EC'04, 2004.
-
-
-
-
17
-
-
34247577813
-
-
P. Graham, A plan for spam, January 2003. Available from: http://www.paulgraham.com/spam.html.
-
-
-
-
18
-
-
34247611641
-
-
P. Graham, Better bayesian filtering. Available from: http://www.paulgraham.com/better.html, January 2003.
-
-
-
-
19
-
-
34247573682
-
-
E. Harris, The next step in the spam control war: Greylisting, White Paper, 2003.
-
-
-
-
21
-
-
34247637468
-
-
ITS. Spam at the university of hawaii. Available from: http://www.hawaii.edu/infotech/spam/spam.html. Last checked: 11/19/2005.
-
-
-
-
22
-
-
34247584806
-
-
A. Juels, J. Brainard, Client puzzles: A cryptographic defense against connection depletion attacks, in: Proceedings of NDSS-1999, February 1999.
-
-
-
-
23
-
-
3042776945
-
Simple mail transfer protocol
-
Klensin J. Simple mail transfer protocol. RFC 2821 (2001)
-
(2001)
RFC 2821
-
-
Klensin, J.1
-
24
-
-
34247640438
-
-
M. Lentczner, M.W. Wong, Sender Policy Framework (spf): Authorizing Use of Domains in MAIL FROM. Internet Draft, October 2004. Work in Progress.
-
-
-
-
25
-
-
34247630348
-
-
K. Li, C. Pu, M. Ahamad, Resisting spam delivery by TCP damping, in: Proceedings of First Conference on Email and Anti-Spam (CEAS), July 2004.
-
-
-
-
26
-
-
34247573681
-
-
J. Lyon, M. Wong, Sender ID: Authenticating e-mail. Internet Draft, August 2004. Work in Progress.
-
-
-
-
27
-
-
33745909200
-
Interview: Ethernet's inventor sounds off
-
Mannion P. Interview: Ethernet's inventor sounds off. Information Week (2005)
-
(2005)
Information Week
-
-
Mannion, P.1
-
28
-
-
34247625795
-
-
A. Ramachandran, N. Feamster, Understanding the network-level behavior of spammers, in: Proceedings of ACM SIGCOMM, September 2006.
-
-
-
-
29
-
-
34247590626
-
-
RBL. Real-time spam black lists (RBL). Available from: http://www.email-policy.com/Spam-black-lists.htm.
-
-
-
-
30
-
-
34247581514
-
-
M. Sahami, S. Dumais, D. Heckerman, E. Horvitz, A bayesian approach to filtering junk E-mail. In Learning for Text Categorization: Papers from the 1998 Workshop, Madison, Wisconsin, 1998. AAAI Technical Report WS-98-05.
-
-
-
-
31
-
-
34247624811
-
-
Sophos Plc. Sophos plc. Available from: http://www.sophos.com/.
-
-
-
-
32
-
-
34247562491
-
-
SpamAssassin. The apache spamassassin project. Available from: http://spamassassin.apache.org/.
-
-
-
-
33
-
-
34247564083
-
-
The Editors. Product of the year: Spam? Information Week, 2004.
-
-
-
-
34
-
-
36849057675
-
-
R. Twining, M. Williamson, M. Mowbray, M. Rahmouni. Email prioritization: reducing delays on legitimate mail caused junk mail, in: USENIX Conference, June 27 to July 2 2004.
-
-
-
-
35
-
-
34247589436
-
-
M. Wong, What email forwarding services need to know about SPF. Available from: http://spf.pobox.com/emailforwarders.pdf.
-
-
-
|