Proceedings of the 21st ACM Internet Measurement Conference 2021
DOI: 10.1145/3487552.3487820
|View full text |Cite
|
Sign up to set email alerts
|

Who's got your mail?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…SMTP plays a pivotal role on the Internet by defining both the MTA client and MTA server. Its primary purpose is to establish the guidelines for the transfer of data between the MTA client and MTA server through the exchange of commands and responses [98], [99]. In essence, SMTP provides the framework for the seamless transfer of emails across the Internet.…”
Section: Smtpmentioning
confidence: 99%
“…SMTP plays a pivotal role on the Internet by defining both the MTA client and MTA server. Its primary purpose is to establish the guidelines for the transfer of data between the MTA client and MTA server through the exchange of commands and responses [98], [99]. In essence, SMTP provides the framework for the seamless transfer of emails across the Internet.…”
Section: Smtpmentioning
confidence: 99%
“…The Microsoft support website explains how to enable the capability in various versions of Outlook. Additionally, encryption for web-based email services is supported through browser add-ons like Gmail S/MIME for Firefox [36][37][38][39].…”
Section: Email Abuse Scenarios and Threats In Email Communicationmentioning
confidence: 99%
“…The attribute A with the biggest information gain is chosen as the dividing element. This is comparable to saying that we are looking for partition qualities that will result in the best ranking [38]. Information gain is considered an automatic detecting system based on the mathematical approach, and this method aids in calculating the importance of qualities that compose emails to classify them to locate the bad ones (forensics) [39].…”
Section: Information Gainmentioning
confidence: 99%
“…Moreover, SPF vulnerabilities can be magnified with the emergence of shared infrastructure. First, more and more organizations and institutions host their email services to professional email service providers [14]. Most email providers require their clients to include SPF records of email providers in their own SPF records, which directly leads to the centralization of SPF deployment.…”
Section: Introductionmentioning
confidence: 99%