Current approaches to phishing prevention are focused on the web browser and the user's interaction with it. We present a new approach to allowing users to interact reliably ...
This paper describes two innovative analysis methods for IPv4 address sets such as antispam blacklists. First, the contents analysis provides means of measuring key properties of ...
Analysis of traffic logs of email received by a large UK ISP shows considerable disparity between the proportions of spam received by addresses with different first characters. Th...
As businesses become more reliance on information technology, electronic information is often produced as vital evidence during civil litigation. The process of discovering electr...
A method is presented which analyses the audio speech data of voice calls and calculates an "acoustic fingerprint". The audio data of the voice calls are compared with e...