Understanding the network-level behavior of spammers
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
DNCOCO'07 Proceedings of the 9th WSEAS International Conference on Data Networks, Communications, Computers
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Proceedings of the 2008 ACM symposium on Applied computing
Accountable internet protocol (aip)
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Analyzing the Performance of Spam Filtering Methods When Dimensionality of Input Vector Changes
MLDM '07 Proceedings of the 5th international conference on Machine Learning and Data Mining in Pattern Recognition
Advantages and vulnerabilities of pull-based email-delivery
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
Factors involved in estimating cost of email spam
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part II
Re-wiring activity of malicious networks
PAM'12 Proceedings of the 13th international conference on Passive and Active Measurement
SPIDER: A platform for managing SIP-based Spam over Internet Telephony SPIT
Journal of Computer Security
Hi-index | 0.00 |
From the Author: "You may hate spam and think all spammers are evil, but listen to my story and see why I do this and more importantly, HOW." For most people, the term "SPAM" conjures up the image of hundreds of annoying, and at times offensive, e-mails flooding your inbox every week. But for a few, SPAM is a way of life that delivers an adrenaline rush fueled by cash, danger, retribution, porn and the avoidance of local, federal, and international law enforcement agencies. "Inside the SPAM Cartel" offer you a never-before view inside this dark sub-economy. You'll meet the characters that control the flow of money as well as the hackers and programmers committed to keeping the enterprise up and running. You may disagree with their objectives, but you can't help but to marvel at their ingenuity and resourcefullness in defeating spam filters, avoiding being identified, and staying one step ahead of the law.