Login / Signup

Exploring Current E-mail Cyber Threats using Authenticated SMTP Honeypot.

Lukás ZobalDusan KolárJakub Kroustek
Published in: ICETE (2) (2020)
Keyphrases
  • email
  • cyber security
  • data sets
  • social networks
  • spam filtering
  • instant messaging
  • insider threat
  • communication medium
  • cyber crime