共 50 条
- [31] One Way to Detecting of Link Spam [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL NETWORK CONFERENCE (INC 2010), 2010, : 307 - 314
- [32] Detecting image based spam email [J]. ADVANCES IN HYBRID INFORMATION TECHNOLOGY, 2007, 4413 : 168 - 177
- [33] Detecting policy violations through traffic analysis [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 109 - +
- [35] A VoIP SPAM Reduction Framework [J]. 2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2013, : 357 - 362
- [37] A protection method against massive error mails caused by sender spoofed spam mails [J]. 2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 2005, : 384 - 390
- [38] A Sender-Centric Approach to Detecting Phishing Emails [J]. 2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 32 - 39