Sciweavers

21 search results - page 4 / 5
» On the Spam Campaign Trail
Sort
View
CEAS
2007
Springer
13 years 11 months ago
Slicing Spam with Occam's Razor
To evade blacklisting, the vast majority of spam email is sent from exploited MTAs (i.e., botnets) and with forged “From” addresses. In response, the anti-spam community has d...
Chris Fleizach, Geoffrey M. Voelker, Stefan Savage
ICC
2009
IEEE
13 years 3 months ago
Simulation of SPIT Filtering: Quantitative Evaluation of Parameter Tuning
A future where Internet Telephony will constitute a target valuable to attack is not so unrealistic. E-mail spam botnets software can be updated to send voice spam (commonly referr...
Federico Menna, Renato Lo Cigno, Saverio Niccolini...
CSE
2009
IEEE
13 years 3 months ago
The Use of Online Videos in the 2008 U.S. Congressional Elections
With 39% of Americans admitting the use of the Web to get unfiltered campaign materials, it becomes important to evaluate how they are searching for these materials and what they a...
Eni Mustafaraj, Panagiotis Takis Metaxas, Catherin...
EUROMED
2010
13 years 3 months ago
Cultural Heritage and Sustainable Valorization in the Governorate of Tartous with Reference to the Euromed IV Project: The Contr
Six Mediterranean countries are participating in the "Mare Nostrum" project: "A Heritage Trail along the Phoenician maritime routes and through the historic port cit...
Grazia Tucci, Francesco Algostino, Laura Bucalossi...
CEAS
2005
Springer
13 years 10 months ago
Searching For John Doe: Finding Spammers and Phishers
Microsoft has prosecuted a vigorous civil enforcement campaign against spammers and phishers. When initial investigation into a spam or phishing case fails to reveal the identity ...
Aaron E. Kornblum