共 50 条
- [31] Statistical Anomaly Detection on Real e-Mail Traffic PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS CISIS 2008, 2009, 53 : 170 - 177
- [32] Statistical anomaly detection on real e-mail traffic JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 604 - 611
- [33] A new architecture for enhancing the security of e-mail system SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 449 - 454
- [34] Shared Parameters with Symmetric Key in E-MAIL Security 2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
- [35] Usability Analysis on Security of E-mail Accounts: Differences between Fantasy and Reality INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 85 - 96
- [36] E-mail signature block analysis FOURTEENTH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOLS 1 AND 2, 1998, : 1153 - 1156
- [38] E-mail security: The PKI way - Public key infrastructure end e-mail's similarity to postcards. COMMUNICATIONS NEWS, 2000, 37 (10): : 14 - 14
- [39] A literature based e-mail collaborative LITERACY AND COMMUNITY: THE TWENTIETH YEARBOOK A PEER REVIEWED PUBLICATION OF THE COLLEGE READING ASSOCIATION 1998, 1998, : 84 - 93
- [40] E-mail Spoofing Based on the Datalink Layers and its Application to E-mail Aggregation Systems PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION SCIENCE AND SYSTEM, AISS 2019, 2019,