Login / Signup

A Methodology for Analyzing Overall Flow of Spam-Based Attacks.

Jungsuk SongDaisuke InoueMasashi EtoMio SuzukiSatoshi HayashiKoji Nakao
Published in: ICONIP (2) (2009)
Keyphrases
  • malicious users
  • spam detection
  • spam filters
  • email
  • flow patterns
  • information retrieval
  • information flow
  • countermeasures
  • security mechanisms
  • computer security
  • attack detection