Sciweavers

77 search results - page 9 / 16
» IP Addresses in Email Clients
Sort
View
NETWORKING
2000
13 years 9 months ago
A Reliable Subcasting Protocol for Wireless Environments
This paper presents an end-to-end reliable multicast protocol for use in environments with wireless access. It divides a multicast tree into sub-trees where subcasting within these...
Djamel Fawzi Hadj Sadok, Carlos de M. Cordeiro, Ju...
DFN
2003
13 years 9 months ago
Virtual Private Networks Coping with Complexity
: Large-scale deployment of virtual private networks with hundreds or thousands of clients means a constant battle with complexity that can only be won by setting up powerful authe...
Andreas Steffen
PAM
2009
Springer
14 years 2 months ago
Dynamics of Online Scam Hosting Infrastructure
This paper studies the dynamics of scam hosting infrastructure, with an emphasis on the role of fast-flux service networks. By monitoring changes in DNS records of over 350 distin...
Maria Konte, Nick Feamster, Jaeyeon Jung
CEAS
2005
Springer
14 years 1 months ago
SMTP Path Analysis
Most proponents of domain authentication suggest combining domain authentication with reputation services. This paper presents a new learning algorithm for learning the reputation...
Barry Leiba, Joel Ossher, V. T. Rajan, Richard Seg...
CEAS
2011
Springer
12 years 7 months ago
Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems
Web mail providers rely on users to “vote” to quickly and collaboratively identify spam messages. Unfortunately, spammers have begun to use bots to control large collections o...
Anirudh Ramachandran, Anirban Dasgupta, Nick Feams...