51![Internet Monitoring via DNS Traffic Analysis Wenke Lee Georgia Institute of Technology 0 Internet Monitoring via DNS Traffic Analysis Wenke Lee Georgia Institute of Technology 0](https://www.pdfsearch.io/img/1e7d5e07ea3a329a6360b36ccbe3774c.jpg) | Add to Reading ListSource URL: www.cyber.umd.eduLanguage: English - Date: 2012-11-19 10:50:45
|
---|
52![Detecting Gray in Black and White Christian Rossow, Thomas Czerwinski, Christian J. Dietrich, Norbert Pohlmann Institute for Internet security University of Applied Sciences Gelsenkirchen, Germany {rossow|czerwinski|diet Detecting Gray in Black and White Christian Rossow, Thomas Czerwinski, Christian J. Dietrich, Norbert Pohlmann Institute for Internet security University of Applied Sciences Gelsenkirchen, Germany {rossow|czerwinski|diet](https://www.pdfsearch.io/img/1a7c46bf40bcd2d70c37cb725c261d19.jpg) | Add to Reading ListSource URL: www.christian-rossow.deLanguage: English - Date: 2011-05-11 02:07:53
|
---|
53![CEAS[removed]paper dietrich rossow CEAS[removed]paper dietrich rossow](https://www.pdfsearch.io/img/c2d80c649de86f88816e97677bfcf249.jpg) | Add to Reading ListSource URL: www.christian-rossow.deLanguage: English - Date: 2011-05-11 02:08:58
|
---|
54![Abuse handling initatieven Abuse handling initatieven](https://www.pdfsearch.io/img/1d25bdbbe598b62e67e995068c3ab63a.jpg) | Add to Reading ListSource URL: www.terena.orgLanguage: English - Date: 2007-05-04 07:47:14
|
---|
55![policyd-weight by Robert Felber Unorthodox methods policyd-weight and some unorthodox approaches to eliminating spam policyd-weight by Robert Felber Unorthodox methods policyd-weight and some unorthodox approaches to eliminating spam](https://www.pdfsearch.io/img/ce63e617658175e1324943d9b1cb95f0.jpg) | Add to Reading ListSource URL: www.arschkrebs.deLanguage: English - Date: 2007-03-04 07:01:50
|
---|
56![Technical responses to spam November 2003 Executive Summar y In response to the growing torrent of unsolicited bulk email, informally known as spam, many technical schemes have been proposed and implemented to distinguis Technical responses to spam November 2003 Executive Summar y In response to the growing torrent of unsolicited bulk email, informally known as spam, many technical schemes have been proposed and implemented to distinguis](https://www.pdfsearch.io/img/e8b135357952f818e22705f1bb382ec1.jpg) | Add to Reading ListSource URL: www.taugh.comLanguage: English - Date: 2013-03-17 11:53:15
|
---|
57![Microsoft Word - NDR spam paper.doc Microsoft Word - NDR spam paper.doc](https://www.pdfsearch.io/img/c64d4f21f8a42bb6c948374d31b741bc.jpg) | Add to Reading ListSource URL: www.gfi.comLanguage: English - Date: 2009-06-26 06:27:23
|
---|
58![Design of a DDoS Attack-Resistant Distributed Spam Blocklist Design of a DDoS Attack-Resistant Distributed Spam Blocklist](https://www.pdfsearch.io/img/63345ca0daa106de9644de3c8358e24a.jpg) | Add to Reading ListSource URL: www.berkes.caLanguage: English - Date: 2004-11-06 19:27:06
|
---|
59![The Role of Country-based eMail Filtering In Spam Reduction Using Country-of-Origin Technique to Counter Spam eMail The Role of Country-based eMail Filtering In Spam Reduction Using Country-of-Origin Technique to Counter Spam eMail](https://www.pdfsearch.io/img/0afc8722cf8f0d6d37320245f476c546.jpg) | Add to Reading ListSource URL: www.cmsconnect.comLanguage: English - Date: 2010-10-30 06:21:45
|
---|