Login / Signup
Controlling spam and spear phishing via peered network overlays and non-repudiable traceback.
Stephen W. Neville
Michael Horie
Published in:
eCrime Researchers Summit (2011)
Keyphrases
</>
email
spam filtering
peer to peer
computer networks
communication networks
network layer
network model
network structure
end to end
network traffic
spam detection
social network analysis
spam filters