-
1
-
-
48649102499
-
The design and development of an undercover multipurpose anti-spoofing kit (unmask)
-
Miami Beach, FL, Dec
-
S. Aggarwal, J. Bali, Z. Duan, L. Kermes, W. Liu, S. Sahai, and Z. Zhu. The design and development of an undercover multipurpose anti-spoofing kit (unmask). In 23rd Annual Computer Security Applications Conference (ACSAC), Miami Beach, FL, Dec. 2007.
-
(2007)
23rd Annual Computer Security Applications Conference (ACSAC)
-
-
Aggarwal, S.1
Bali, J.2
Duan, Z.3
Kermes, L.4
Liu, W.5
Sahai, S.6
Zhu, Z.7
-
2
-
-
77955394049
-
DomainKeys Identified Mail (DKIM) signatures
-
May
-
E. Allman, J. Callas, M. Delany, M. Libbey, J. Fenton, and M. Thomas. DomainKeys Identified Mail (DKIM) Signatures. RFC 4871, May 2007.
-
(2007)
RFC 4871
-
-
Allman, E.1
Callas, J.2
Delany, M.3
Libbey, M.4
Fenton, J.5
Thomas, M.6
-
3
-
-
51749091237
-
Domain-based email authentication using public-keys advertised in the DNS (domainkeys)
-
Aug., Work in Progress
-
M. Delany. Domain-based email authentication using public-keys advertised in the DNS (domainkeys). Internet Draft, Aug. 2004. Work in Progress.
-
(2004)
Internet Draft
-
-
Delany, M.1
-
4
-
-
70349655439
-
Detecting spam zombies by monitoring outgoing messages
-
Apr
-
Z. Duan, P. Chen, F. Sanchez, Y. Dong, M. Stephenson, and J. Barker. Detecting spam zombies by monitoring outgoing messages. In Proc. IEEE INFOCOM, Apr. 2009.
-
(2009)
Proc. IEEE INFOCOM
-
-
Duan, Z.1
Chen, P.2
Sanchez, F.3
Dong, Y.4
Stephenson, M.5
Barker, J.6
-
6
-
-
14944360448
-
Characterizing a spam traffic
-
Oct
-
L. Gomes, C. Cazita, J. Almeida, V. Almeida, and W. Meira. Characterizing a spam traffic. In Proceedings of IMC'04, Oct. 2004.
-
(2004)
Proceedings of IMC'04
-
-
Gomes, L.1
Cazita, C.2
Almeida, J.3
Almeida, V.4
Meira, W.5
-
8
-
-
33846700978
-
Spam and the ongoing battle for the inbox
-
Feb
-
J. Goodman, G. V. Cormack, and D. Heckerman. Spam and the ongoing battle for the inbox. Communications of the ACM, 50(2):25-33, Feb. 2007.
-
(2007)
Communications of the ACM
, vol.50
, Issue.2
, pp. 25-33
-
-
Goodman, J.1
Cormack, G.V.2
Heckerman, D.3
-
11
-
-
84865578386
-
DomainKeys Identified Mail (DKIM) service overview
-
June
-
T. Hansen, D. Croker, and P. Hallam-Baker. DomainKeys Identified Mail (DKIM) Service Overview. RFC 5585, June 2009.
-
(2009)
RFC 5585
-
-
Hansen, T.1
Croker, D.2
Hallam-Baker, P.3
-
13
-
-
78650878882
-
Simple mail transfer protocol
-
Oct
-
J. Klensin. Simple Mail Transfer Protocol. RFC 5321, Oct. 2008.
-
(2008)
RFC 5321
-
-
Klensin, J.1
-
14
-
-
38549105180
-
Sender ID: Authenticating e-mail
-
Apr
-
J. Lyon and M. Wong. Sender ID: Authenticating e-mail. RFC 4406, Apr. 2006.
-
(2006)
RFC 4406
-
-
Lyon, J.1
Wong, M.2
-
15
-
-
33847737144
-
Understanding the network-level behavior of spammers
-
Sept
-
A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. In Proc. ACM SIGCOMM, Sept. 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Ramachandran, A.1
Feamster, N.2
-
16
-
-
78649326155
-
Internet message format
-
Oct
-
P. Resnick. Internet message format. RFC 5322, Oct. 2008.
-
(2008)
RFC 5322
-
-
Resnick, P.1
-
21
-
-
38349038696
-
Sender policy framework (spf): Authorizing use of domains in e-mail, version 1
-
Apr
-
M. Wong and W. Schlitt. Sender policy framework (spf): Authorizing use of domains in e-mail, version 1. RFC 4408, Apr. 2006.
-
(2006)
RFC 4408
-
-
Wong, M.1
Schlitt, W.2
-
22
-
-
58449122201
-
Spamming botnets: Signatures and characteristics
-
Seattle, WA, Aug
-
Y. Xie, F. Xu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming botnets: Signatures and characteristics. In Proc. ACM SIGCOMM, Seattle, WA, Aug. 2008.
-
(2008)
Proc. ACM SIGCOMM
-
-
Xie, Y.1
Xu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
23
-
-
84904787738
-
-
Zoneedit. Free DNS service. http://www.zoneedit.com/.
-
Free DNS Service
-
-
|