<--- Back to Details
First PageDocument Content
Anti-spam techniques / Honeypot / Email spam / Spam in blogs / Spam / Open mail relay / Email / Image spam / Spam email delivery / Spamming / Internet / Computing
Date: 2011-03-04 18:53:06
Anti-spam techniques
Honeypot
Email spam
Spam in blogs
Spam
Open mail relay
Email
Image spam
Spam email delivery
Spamming
Internet
Computing

A Campaign-based Characterization of Spamming Strategies Pedro H. Calais, Douglas E. V. Pires Cristine Hoepers, Dorgival Olavo Guedes, Wagner Meira Jr. Klaus Steding-Jessen

Add to Reading List

Source URL: honeytarg.cert.br

Download Document from Source Website

File Size: 220,16 KB

Share Document on Facebook

Similar Documents

Click Trajectories: End-to-End Analysis of the Spam Value Chain

Click Trajectories: End-to-End Analysis of the Spam Value Chain

DocID: 1xVUj - View Document

Effect of Spam on Hashtag Recommendation for Tweets Surendra Sedhai Aixin Sun  Nanyang Technological University, Nanyang Avenue, Singapore

Effect of Spam on Hashtag Recommendation for Tweets Surendra Sedhai Aixin Sun Nanyang Technological University, Nanyang Avenue, Singapore

DocID: 1xVU9 - View Document

Can One Tamper with the Sample API? - Toward Neutralizing Bias from Spam and Bot Content Fred Morstatter, Harsh Dani, Justin Sampson, and Huan Liu Arizona State University, Tempe, AZ, USA  {fred.morstatter, harsh.dani, j

Can One Tamper with the Sample API? - Toward Neutralizing Bias from Spam and Bot Content Fred Morstatter, Harsh Dani, Justin Sampson, and Huan Liu Arizona State University, Tempe, AZ, USA {fred.morstatter, harsh.dani, j

DocID: 1xUgz - View Document

PDF Document

DocID: 1xyjp - View Document

DOC Document

DocID: 1xsO0 - View Document