Who sent the e-mail?

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trap E-mail Address for Combating E-mail Viruses

The biggest infection events show that the most dangerous viruses propagate via the Internet email systems. We propose a new solution to accelerate the identification of infected computers after an attack by e-mail viruses. Our approach uses trap e-mail addresses secured by a feasible cryptographic technique. The novelty of our work is the introduction of virtual e-mail addresses to identify vi...

متن کامل

E E-mail Data Stores

For many people, e-mail has become a running record of their business and personal lives. Somewhere in that big clot of e-mail messages that have accumulated over the years is a wealth of information about people they’ve met, work they’ve done, meetings they’ve held. There are tough calls and tender moments, great debates and funny episodes. When did you first meet a certain person? Just what w...

متن کامل

Collaborative E-Mail Filtering

Acknowledgements I would like to thank my advisor, Dr. Susan Gauch, for guidance throughout my undergraduate and graduate years at the University of Kansas. Also, thanks to my thesis committee: Dr. Victor Frost, to whom I also owe my many opportunities at ITTC, and Dr. Perry Alexander, who served on my committee on short notice. I would like to thank my family: Ralph, Charlene, Jeff, and Denise...

متن کامل

Mining E-mail Authorship

In this paper we report an investigation into the learning of authorship identification or categorisation for the case of e-mail documents. We use various e-mail document features such as structural characteristics and linguistic evidence together with the Support Vector Machine as the learning algorithm. Experiments on a number of e-mail documents give promising results with some e-mail docume...

متن کامل

Tracing E-mail Headers

This paper will discuss tracing e-mail headers and issues associated with it. It will address both HTTP & SMTP initiated e-mails. It will discuss different ways used by e-mail senders to evade tracing and workarounds used by investigators to combat them. It will also discuss advanced measures and techniques used by investigators to track emails. The paper will not however discuss any particular...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Law, Probability and Risk

سال: 2003

ISSN: 1470-8396,1470-840X

DOI: 10.1093/lpr/2.1.61