An e-mail signature protocol for anti-spam work-in-progress
Proceedings of the 2nd international conference on Scalable information systems
On the properties of spam-advertised URL addresses
Journal of Network and Computer Applications
Assessing anti-phishing preparedness: A study of online banks in Hong Kong
Decision Support Systems
EC-Web 2009 Proceedings of the 10th International Conference on E-Commerce and Web Technologies
A survey of emerging approaches to spam filtering
ACM Computing Surveys (CSUR)
Hi-index | 4.10 |
To counter the explosion of spam and phishing attacks that cost victims time and money, companies are pursuing e-mail authentication, which is designed to determine whether mail has come from a reliable source and is thus legitimate.