-
1
-
-
14944385133
-
An empirical study of spam traffic and the use of DNS Black lists
-
Italy, Oct 25-27
-
Jae Yeon Jung, Emil sit, "An empirical study of spam traffic and the use of DNS Black lists", ACM SIGCOMM Internet measurement conferences, Italy, Oct 25-27,2004, pp 370-75.
-
(2004)
ACM SIGCOMM Internet measurement conferences
, pp. 370-375
-
-
Yeon Jung, J.1
sit, E.2
-
2
-
-
84904819221
-
-
CEAS, CA, USA, July 27-28
-
Anirudh Ramachandran, David Dagon, Nick Feamste, "Can DNS-based Blacklists keep up with Bots", CEAS 2006, CA, USA, July 27-28, 2006, 1-2.
-
(2006)
Can DNS-based Blacklists keep up with Bots
, pp. 1-2
-
-
Ramachandran, A.1
Dagon, D.2
Feamste, N.3
-
3
-
-
78650759510
-
-
JRPIT 38,1,Australia, SAM, June
-
Guangsen Zhang, Manish Parashar, "Cooperative mechanism against DDOS attacks",JRPIT 38,1,Australia, SAM 2005, pg 86-96, June, 2005.
-
(2005)
Cooperative mechanism against DDOS attacks
, pp. 86-96
-
-
Zhang, G.1
Parashar, M.2
-
4
-
-
33750365498
-
-
Anirudh Ramachandran, Nick Feamster, Understanding the network level behaviour of spammers, SIGCOMM 06,Pisa, Italy, September 11-16,2006, 291-302.
-
Anirudh Ramachandran, Nick Feamster, "Understanding the network level behaviour of spammers", SIGCOMM 06,Pisa, Italy, September 11-16,2006, 291-302.
-
-
-
-
5
-
-
37349039786
-
-
Ben Laurie, Richard Clayton, Proof of work proves not to work, WEIS04, Minneapolis MN, May 13-14, 2004.
-
Ben Laurie, Richard Clayton, "Proof of work proves not to work", WEIS04, Minneapolis MN, May 13-14, 2004.
-
-
-
-
6
-
-
37349111852
-
-
Ben Adida, David Chau, susan Hohenberger, Ronald L rivest, Lightweight Signatures for Email, DIMACS, 2006, USA, pp 93-99.
-
Ben Adida, David Chau, susan Hohenberger, Ronald L rivest," Lightweight Signatures for Email", DIMACS, 2006, USA, pp 93-99.
-
-
-
-
7
-
-
37349016302
-
Controlling spam through Lightweight currency
-
HI,USA
-
David A Turner, Daniel M Havey, "Controlling spam through Lightweight currency", ICCS-04,HI,USA 2004.
-
(2004)
ICCS-04
-
-
Turner, D.A.1
Havey, D.M.2
-
8
-
-
37349062790
-
-
Carl Eklund, Spam -from nuisance to Internet Infestation, Peer to Peer and SPAM in the Internet Raimo Kantola's technical report, 126-134, 2004.
-
Carl Eklund, "Spam -from nuisance to Internet Infestation", Peer to Peer and SPAM in the Internet Raimo Kantola's technical report, 126-134, 2004.
-
-
-
-
9
-
-
37349086217
-
-
Vladimir Mijatovic, Mechanism for detecting and prevention of email spamming, Peer to Peer and SPAM in the Internet Raimo Kantola's technical report, 135-145, 2004.
-
Vladimir Mijatovic, "Mechanism for detecting and prevention of email spamming", Peer to Peer and SPAM in the Internet Raimo Kantola's technical report, 135-145, 2004.
-
-
-
-
10
-
-
37349074147
-
-
Keno Albrecht, Nicolas Burri, Roger Wattenhofer, Spamato-An extendable spam filter system, CEAS-05, CA,USA, July 2005.
-
Keno Albrecht, Nicolas Burri, Roger Wattenhofer, "Spamato-An extendable spam filter system", CEAS-05, CA,USA, July 2005.
-
-
-
-
11
-
-
37349127064
-
-
Jean-Marc Seigneur, Nathan Dimmock, Ciaran Bryce, Christain Damsgaard Jensen, Combating spam with TEA (Trustworthy email addresses) PST 2004, 47-58, 2004. pp 47-58.
-
Jean-Marc Seigneur, Nathan Dimmock, Ciaran Bryce, Christain Damsgaard Jensen, "Combating spam with TEA (Trustworthy email addresses)" PST 2004, 47-58, 2004. pp 47-58.
-
-
-
-
12
-
-
37349102043
-
-
Taughannok networks, Technical response to spam, Technical report, November 2003.
-
Taughannok networks, "Technical response to spam", Technical report, November 2003.
-
-
-
-
13
-
-
37349121493
-
SPF helps Legitimate E-mail get through spam filters
-
November
-
Ralph F Wilson, "SPF helps Legitimate E-mail get through spam filters", Web marketing today premium, Issue 85, November 2004.
-
(2004)
Web marketing today premium
, Issue.85
-
-
Wilson, R.F.1
-
14
-
-
30344436961
-
Monitoring the effect of Macroscopic Effect of DDOS flooding attacks
-
Jian Yuan, Kevin Mills, "Monitoring the effect of Macroscopic Effect of DDOS flooding attacks", IEEE Transactions on Dependable and Secure Computing, Volume 2, No. 4, pp. 324-335, 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.4
, pp. 324-335
-
-
Yuan, J.1
Mills, K.2
-
17
-
-
37349105017
-
-
SURBL http://www.surbl.org/lists.html
-
SURBL http://www.surbl.org/lists.html
-
-
-
-
18
-
-
37349066813
-
-
Grey Listing-http://greylisting.org/
-
Grey Listing
-
-
-
20
-
-
37349014181
-
-
The Spamhous Project
-
The Spamhous Project. www.spamhaus.org
-
-
-
-
21
-
-
78649407428
-
-
SpamAssassin http://spamassassin.apache.org
-
SpamAssassin
-
-
-
22
-
-
37349005574
-
-
SpamCop http://spamcop.net
-
SpamCop
-
-
-
23
-
-
37349119436
-
-
Cloudmark, http://www.cloudmark.com
-
Cloudmark
-
-
-
25
-
-
37349082555
-
-
spamhous under attack http://www.virus.org/news/spyware/spamhaus- survives-DDoS-attack.html].
-
spamhous under attack http://www.virus.org/news/spyware/spamhaus- survives-DDoS-attack.html].
-
-
-
-
26
-
-
37349084640
-
-
Email Bombing and Spamming: www.cert.org/tech_tips/ email_bombing_spamming.html
-
Email Bombing and Spamming: www.cert.org/tech_tips/ email_bombing_spamming.html
-
-
-
|