Sciweavers

Share
29 search results - page 1 / 6
» ceas 2008
Sort
View
CEAS
2008
Springer
9 years 9 months ago
Breaking out of the Browser to Defend Against Phishing Attacks
Current approaches to phishing prevention are focused on the web browser and the user's interaction with it. We present a new approach to allowing users to interact reliably ...
Diana K. Smetters, Paul Stewart
CEAS
2008
Springer
9 years 9 months ago
Empirical research on IP blacklisting
This paper describes two innovative analysis methods for IPv4 address sets such as antispam blacklists. First, the contents analysis provides means of measuring key properties of ...
Christian Dietrich, Christian Rossow
CEAS
2008
Springer
9 years 9 months ago
Do Zebras get more Spam than Aardvarks?
Analysis of traffic logs of email received by a large UK ISP shows considerable disparity between the proportions of spam received by addresses with different first characters. Th...
Richard Clayton
CEAS
2008
Springer
9 years 9 months ago
Reducing E-Discovery Cost by Filtering Included Emails
As businesses become more reliance on information technology, electronic information is often produced as vital evidence during civil litigation. The process of discovering electr...
Tsuen-Wan Ngan
CEAS
2008
Springer
9 years 9 months ago
Analysis of Spectral Parameters of Audio Signals for the Identification of Spam Over IP Telephony
A method is presented which analyses the audio speech data of voice calls and calculates an "acoustic fingerprint". The audio data of the voice calls are compared with e...
Christoph Pörschmann, Heiko Knospe
books