Investigating the leakage of sensitive personal and organisational information in email headers
暂无分享,去创建一个
Sadie Creese | Michael Goldsmith | Jason R. C. Nurse | Arnau Erola | S. Creese | M. Goldsmith | Arnau Erola
[1] Marwan Al-Zarouni,et al. Tracing E-mail Headers , 2004, Australian Computer, Network & Information Forensics Conference.
[2] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[3] Peter W. Resnick,et al. Internet Message Format , 2001, RFC.
[4] Wolfgang Nejdl,et al. MailRank: using ranking for spam detection , 2005, CIKM '05.
[5] Jeffrey C. Mogul,et al. Registration Procedures for Message Header Fields , 2004, RFC.
[6] George M. Mohay,et al. Mining e-mail content for author identification forensics , 2001, SGMD.
[7] John C. Klensin,et al. Simple Mail Transfer Protocol , 2001, RFC.
[8] Dirk Fox. Computer Emergency Response Team (CERT) , 2002, Datenschutz und Datensicherheit.