Code and Other Laws of Cyberspace
Code and Other Laws of Cyberspace
IBM Systems Journal
Catching spam before it arrives: domain specific dynamic blacklists
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Overview of security issues of VOIP
IMSA'07 IASTED European Conference on Proceedings of the IASTED European Conference: internet and multimedia systems and applications
Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods
WI-IATW '07 Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops
A spam rejection scheme during SMTP sessions based on layer-3 e-mail classification
Journal of Network and Computer Applications
Journal of Network and Computer Applications
Overview of security issues of VoIP
EurolMSA '07 Proceedings of the Third IASTED European Conference on Internet and Multimedia Systems and Applications
A neural model in anti-spam systems
ICANN'06 Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part II
Hi-index | 0.00 |
Unsolicited email is a major problem for anyone who transmits or receives email on a computer, telephone, or personal digital assistant. This article describes the magnitude of the problem, the reasons for proliferation, some interventions available today, and the degree to which each has been effective.