A Spoofed E-Mail Countermeasure Method by Scoring the Reliability of DKIM Signature Using Communication Data.
Kanako KonnoKenya DanNaoya KitagawaPublished in: COMPSAC (2) (2017)
Keyphrases
- synthetic data
- input data
- data sets
- prior knowledge
- statistical methods
- noisy data
- detection method
- database
- image data
- data acquisition
- significant improvement
- pairwise
- data analysis
- training data
- test data
- missing data
- prior information
- data distribution
- statistical analysis
- clustering method
- raw data
- scoring methods
- instant messaging
- correlation analysis
- statistical significance
- data quality
- image sequences
- spectral clustering
- high quality
- data streams
- data sources
- probability distribution
- data points
- data mining techniques
- computer systems
- training samples