Dantu et al., 2008
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| US10326779B2 (en) | Reputation-based threat protection | |
| US8756289B1 (en) | Message authentication using signatures | |
| US8126971B2 (en) | E-mail authentication | |
| US20170230323A1 (en) | Detection of business email compromise | |
| US7904517B2 (en) | Challenge response systems | |
| US20080313704A1 (en) | Electronic Message Authentication | |
| US10284597B2 (en) | E-mail authentication | |
| WO2018102308A2 (en) | Detecting computer security risk based on previously observed communications | |
| Schryen | Anti-spam measures: analysis and design | |
| Maggi | Are the con artists back? a preliminary analysis of modern phone frauds | |
| Marias et al. | SIP vulnerabilities and anti-SPIT mechanisms assessment | |
| Shirali-Shahreza et al. | A new anti-spam protocol using CAPTCHA | |
| Gupta et al. | Forensic analysis of E-mail address spoofing | |
| Tundis et al. | The role of Information and Communication Technology (ICT) in modern criminal organizations | |
| US20240056466A1 (en) | Computerized system for analysis and of electronic communication systems | |
| Seth et al. | A comprehensive study of classification of phishing attacks with its AI/I detection | |
| Chaudhary | Development review on phishing: a computer security threat | |
| Rawat et al. | An Integrated Review Study on Efficient Methods for Protecting Users from Phishing Attacks | |
| Dantu et al. | Classification of phishers. | |
| US11916873B1 (en) | Computerized system for inserting management information into electronic communication systems | |
| Rebahi et al. | A conceptual architecture for SPIT mitigation | |
| Park et al. | A Novel Traceback Technology for E-mail Sender Verification: Type of submission: Regular Research Paper/Most relevant symposium: CSCI-ISCW | |
| Nakulas et al. | A review of techniques to counter spam and spit | |
| Patel et al. | Take a close look at phishing | |
| Ismail et al. | Image spam detection: problem and existing solution |