Sciweavers

42 search results - page 5 / 9
» Anatomy of a Phishing Email
Sort
View
WOWMOM
2006
ACM
118views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Towards Blocking Outgoing Malicious Impostor Emails
Electronic mails (emails) have become an indispensable part of most people’s daily routines. However, they were not designed for deployment in an adversarial environment, which ...
Erhan J. Kartaltepe, Shouhuai Xu
INCDM
2010
Springer
152views Data Mining» more  INCDM 2010»
13 years 11 months ago
Spam Email Filtering Using Network-Level Properties
Abstract. Spam is serious problem that affects email users (e.g. phishing attacks, viruses and time spent reading unwanted messages). We propose a novel spam email filtering appr...
Paulo Cortez, André Correia, Pedro Sousa, M...
SEC
2007
13 years 9 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
ICML
2009
IEEE
14 years 8 months ago
Bayesian clustering for email campaign detection
We discuss the problem of clustering elements according to the sources that have generated them. For elements that are characterized by independent binary attributes, a closedform...
Peter Haider, Tobias Scheffer
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 7 months ago
A secure email login system using virtual password
In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual...
Nishant Doshi