메뉴 건너뛰기




Volumn 269, Issue , 2007, Pages 45-59

Fighting unicode-obfuscated spam

Author keywords

deobfuscated emails; obfuscated emails; spam emails; SpamAssassin; unicode characters

Indexed keywords

BYPASS FILTERS; HEURISTIC RULES; IMAGE-BASED SPAM; PHISHING; PROTOTYPE TOOLS; SPAM EMAILS; SPAM FILTER; SPAMMERS; STANDARD METHOD; UNICODES;

EID: 77953908448     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1299015.1299020     Document Type: Conference Paper
Times cited : (25)

References (28)
  • 7
    • 77953880486 scopus 로고    scopus 로고
    • Spam Filter Analysis
    • February Available at
    • F. D. Garcia, J.H. Hoepman, J. V. Nieuwenhuizen, "Spam Filter Analysis," arXiv report, February 2004. Available at http://arxiv.org/PS- cache/cs/pdf/0402/0402046v1.pdf
    • (2004) arXiv Report
    • Garcia, F.D.1    Hoepman, J.H.2    Nieuwenhuizen, J.V.3
  • 9
    • 62949105202 scopus 로고    scopus 로고
    • Better Bayesian Filtering
    • Available at
    • P. Graham, "Better Bayesian Filtering," Spam Conference, January 2003. Available at http://www.paulgraham.com/better.html.
    • Spam Conference, January 2003
    • Graham, P.1
  • 13
    • 33749574022 scopus 로고    scopus 로고
    • Channels: Avoiding Unwanted Electronic Mail
    • R. J. Hall, "Channels: Avoiding Unwanted Electronic Mail," Communications of the ACM, Volume 41 Issue 3, 1998.
    • (1998) Communications of the ACM , vol.41 , Issue.3
    • Hall, R.J.1
  • 15
    • 33845954184 scopus 로고    scopus 로고
    • Modeling and Preventing Phishing Attacks
    • Available at
    • M. Jakobsson, "Modeling and Preventing Phishing Attacks," Phishing Panel in Financial Cryptography 2005. Available at www.informatics. indiana.edu/markus/papers/phishing-jakobsson.pdf
    • (2005) Phishing Panel in Financial Cryptography
    • Jakobsson, M.1
  • 18
    • 80053654928 scopus 로고    scopus 로고
    • Accessed 22 May 2007
    • J. Nazario, "Phishing Corpus," http://monkey.org/~jose/blog/ viewpage.php?page=phishing-corpus. Accessed 22 May 2007.
    • Phishing Corpus
    • Nazario, J.1
  • 20
    • 77953882608 scopus 로고    scopus 로고
    • How Spammers Bypass E-mail Security
    • 25 July
    • B. Thorson, "How Spammers Bypass E-mail Security," EE Times, 25 July 2007. http://www.eetimes.com/showArticle.jhtml?articleID=23900564
    • (2007) EE Times
    • Thorson, B.1
  • 22
    • 84889018522 scopus 로고    scopus 로고
    • Using Cartoons to Teach Internet Security
    • 2007-11, July
    • S. Srikwan, M. Jakobsson, "Using Cartoons to Teach Internet Security." DIMACS Technical Report 2007-11, July 2007. http://www. informatics.indiana.edu/markus/documents/security-education.pdf
    • (2007) DIMACS Technical Report
    • Srikwan, S.1    Jakobsson, M.2
  • 23
    • 77953907279 scopus 로고    scopus 로고
    • Accessed 22 May 2007
    • CRM114. http://crm114.sourceforge.net, Accessed 22 May 2007.
  • 24
    • 77953909352 scopus 로고    scopus 로고
    • Anti-Phishing Group of City University of Hong Kong
    • Anti-Phishing Group of City University of Hong Kong, http://antiphishing. cs.cityu.edu.hk.
  • 26
    • 78649407428 scopus 로고    scopus 로고
    • Accessed 22 May 2007
    • SpamAssassin. http://wiki.apache.org/spamassassin, Accessed 22 May 2007.
    • SpamAssassin
  • 27
    • 77953893056 scopus 로고    scopus 로고
    • Accessed 22 May 2007
    • SpamAssassin Readme file. http://www.cpan.org/modules/by-module/Mail/ Mail-SpamAssassin-2.64.readme Accessed 22 May 2007.
    • SpamAssassin Readme File
  • 28
    • 84880404548 scopus 로고    scopus 로고
    • Accessed 25 May 2006
    • SpamAssassin public Corpus, http://spamassassin.apache.org/publiccorpus, Accessed 25 May 2006.
    • SpamAssassin Public Corpus


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.