2007 2nd International Conference on Communication Systems Software and Middleware 2007
DOI: 10.1109/comswa.2007.382440
|View full text |Cite
|
Sign up to set email alerts
|

Unwanted SMTP Paths and Relays

Abstract: Based on the social interactions of an email user, category. Phishing attackers masquerade the identity of a incoming email traffic can be divided into different categories genuine sender and steal consumers' personal identity data such as, telemarketing, Opt-in family members and friends. Due and financial account credentials. Phishers send spoofed emails to a lack of knowledge in the different categories, most of the existing spam filters are prone to high false positives and false and lead consumers to coun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2011
2011
2011
2011

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 2 publications
(1 reference statement)
0
0
0
Order By: Relevance