Login / Signup

Controlling spam and spear phishing via peered network overlays and non-repudiable traceback.

Stephen W. NevilleMichael Horie
Published in: eCrime Researchers Summit (2011)
Keyphrases
  • email
  • spam filtering
  • peer to peer
  • computer networks
  • communication networks
  • network layer
  • network model
  • network structure
  • end to end
  • network traffic
  • spam detection
  • social network analysis
  • spam filters