1 |
G. S. Malkin, 'RFC2453 - RIP Version 2,' Nov., 1998
|
2 |
E. Gabber, M. Jakobsson. Y. Matias, and A. J. Mayer, 'Curbing Junk E-mail via Secure Classification,' Proc. of the Second International Conference on Financial Cryptography, pp.198-213, Feb., 1998
DOI
ScienceOn
|
3 |
Microsoft Corporation, 'Caller ID for E-mail : The Next Step to Deterring Spam,' Feb., 2004.
|
4 |
M. W. Wong and M. Lentczner. 'Sender Policy Frame work(SPF) : A Convention to Describe Hosts Authorized to Send SMTP Traffic,' May 2004, http://www.danisch.de/work/security/txt/draft-mengwong-spf-01.txt
|
5 |
H. Danisch, 'SCAF - Simple Caller Authorization Frame work,' Jan. 2004, http://www.danisch.de/work/security/txt/draft-danisch-scaf-00.txt
|
6 |
I. Androutsopoulos, J. Koutsias, K. V. Chandrinos, G. Paliouras, and C. D. Spyropoulos, 'An Evaluation of Naive Bayesian Anti-Spam Filtering,' Proc. of the Workshop on Machine Learning in the New Information Age, 2000
|
7 |
B. Templeton, 'Proper Principles for Challenge/Response Anti-Spam Systems,' http://www.templetons.com/brad/spam/challengeresponse.html
|
8 |
H. Danisch, 'The RMX DNS RR and Method for Lightweight SMTP Sender Authorization,' Oct. 2003, http://www.danisch.de/work/security/txt/draft-danisch-dns-rr-smtp-03.txt
|
9 |
'전자우편 주소 추출 방지 S/W : NeverSpam', http://www.spamcop.or.kr/swDown/pg_email.jsp
|
10 |
L. F. Cranor and B. A. LaMacchia, 'Spam!', Communications of the ACM, Vol.41, No.8, pp.74-83, Aug., 1998
DOI
ScienceOn
|
11 |
G. Sakkis, I. Androutsopoulos, G. Paliouras, V. Karkaletsis, C. Spyropoulos, and P. Stamatopoulos, 'A Memory-Based Approach to Anti-Spam Filtering,' Tech Report DEMO, National Centre for Scientific Research (NCSR): Demokritos, Athens, 2001
|
12 |
'Why is spam bad?' http://spam.abuse.net/overview/spambad.shtml
|
13 |
S. Hird, 'Technical Solution for Controlling Spam,' Proc. of AUUG (The Australian Unix systems User Group), Melbourne, Sept., 2002
|