-
2
-
-
77953905863
-
-
Retrieved on 25 July 2007
-
R. Cockerham, "There are 600,426,974,379,824,381,952 ways to spell Viagra." http://cockeyed.com/lessons/viagra/viagra.html. Retrieved on 25 July 2007.
-
There Are 600,426,974,379,824,381,952 Ways to Spell Viagra
-
-
Cockerham, R.1
-
5
-
-
34250627255
-
Safeguard against unicode attacks: Generation and Application of UC-simlist
-
A. Y. Fu, W. Zhang, X. Deng, W. Liu, "Safeguard against unicode attacks: generation and Application of UC-simlist," in the 15th International World Wide Web Conference (WWW'06), May 2006.
-
15th International World Wide Web Conference (WWW'06), May 2006
-
-
Fu, A.Y.1
Zhang, W.2
Deng, X.3
Liu, W.4
-
9
-
-
62949105202
-
Better Bayesian Filtering
-
Available at
-
P. Graham, "Better Bayesian Filtering," Spam Conference, January 2003. Available at http://www.paulgraham.com/better.html.
-
Spam Conference, January 2003
-
-
Graham, P.1
-
10
-
-
0042254288
-
Curbing Junk E-mail via Secure Classification
-
E. Gabber, M. Jakobsson, Y. Matias, A. Mayer, "Curbing Junk E-mail via Secure Classification," Financial Cryptograpy, 1998.
-
(1998)
Financial Cryptograpy
-
-
Gabber, E.1
Jakobsson, M.2
Matias, Y.3
Mayer, A.4
-
13
-
-
33749574022
-
Channels: Avoiding Unwanted Electronic Mail
-
R. J. Hall, "Channels: Avoiding Unwanted Electronic Mail," Communications of the ACM, Volume 41 Issue 3, 1998.
-
(1998)
Communications of the ACM
, vol.41
, Issue.3
-
-
Hall, R.J.1
-
15
-
-
33845954184
-
Modeling and Preventing Phishing Attacks
-
Available at
-
M. Jakobsson, "Modeling and Preventing Phishing Attacks," Phishing Panel in Financial Cryptography 2005. Available at www.informatics. indiana.edu/markus/papers/phishing-jakobsson.pdf
-
(2005)
Phishing Panel in Financial Cryptography
-
-
Jakobsson, M.1
-
18
-
-
80053654928
-
-
Accessed 22 May 2007
-
J. Nazario, "Phishing Corpus," http://monkey.org/~jose/blog/ viewpage.php?page=phishing-corpus. Accessed 22 May 2007.
-
Phishing Corpus
-
-
Nazario, J.1
-
20
-
-
77953882608
-
How Spammers Bypass E-mail Security
-
25 July
-
B. Thorson, "How Spammers Bypass E-mail Security," EE Times, 25 July 2007. http://www.eetimes.com/showArticle.jhtml?articleID=23900564
-
(2007)
EE Times
-
-
Thorson, B.1
-
22
-
-
84889018522
-
Using Cartoons to Teach Internet Security
-
2007-11, July
-
S. Srikwan, M. Jakobsson, "Using Cartoons to Teach Internet Security." DIMACS Technical Report 2007-11, July 2007. http://www. informatics.indiana.edu/markus/documents/security-education.pdf
-
(2007)
DIMACS Technical Report
-
-
Srikwan, S.1
Jakobsson, M.2
-
23
-
-
77953907279
-
-
Accessed 22 May 2007
-
CRM114. http://crm114.sourceforge.net, Accessed 22 May 2007.
-
-
-
-
24
-
-
77953909352
-
-
Anti-Phishing Group of City University of Hong Kong
-
Anti-Phishing Group of City University of Hong Kong, http://antiphishing. cs.cityu.edu.hk.
-
-
-
-
26
-
-
78649407428
-
-
Accessed 22 May 2007
-
SpamAssassin. http://wiki.apache.org/spamassassin, Accessed 22 May 2007.
-
SpamAssassin
-
-
-
27
-
-
77953893056
-
-
Accessed 22 May 2007
-
SpamAssassin Readme file. http://www.cpan.org/modules/by-module/Mail/ Mail-SpamAssassin-2.64.readme Accessed 22 May 2007.
-
SpamAssassin Readme File
-
-
-
28
-
-
84880404548
-
-
Accessed 25 May 2006
-
SpamAssassin public Corpus, http://spamassassin.apache.org/publiccorpus, Accessed 25 May 2006.
-
SpamAssassin Public Corpus
-
-
|