Login / Signup
A Methodology for Analyzing Overall Flow of Spam-Based Attacks.
Jungsuk Song
Daisuke Inoue
Masashi Eto
Mio Suzuki
Satoshi Hayashi
Koji Nakao
Published in:
ICONIP (2) (2009)
Keyphrases
</>
malicious users
spam detection
spam filters
email
flow patterns
information retrieval
information flow
countermeasures
security mechanisms
computer security
attack detection