Skip to search formSkip to main contentSkip to account menu

Email spoofing

Known as: Hoax e-mail, Email hoax, Spoof Email 
Email spoofing is the creation of email messages with a forged sender address. Because the core email protocols do not have any mechanism for… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
It is well known that DHCP snooping is a famous countermeasure against DHCP spoofing. Actually, to what extent DHCP snooping can… 
Highly Cited
2018
Highly Cited
2018
Spear phishing has been a persistent threat to users and organizations, and yet email providers still face key challenges to… 
2017
2017
In email systems, one of the most widely used attacks is email spoofing, in which the source address of the email message is… 
2014
2014
A spammer needs three elements to run a spam operation: a list of victim email addresses, content to be sent, and a botnet to… 
2014
2014
Hoaxes are non-malicious viruses. They live on deceiving human’s perception by conveying false claims as truth. Throughout… 
2014
2014
: Hacking is an online fraud where by the criminal pretend to be someone else in order to obtain sensitive information like… 
2013
2013
This study applies the speech acts theory to the study of discourse strategies and functions of hoax email business proposals… 
2010
2010
To launch a spoofing attack with emails we need to have knowledge of the techniques to launch an email spoofing attack. Spoofing… 
2006
2006
Magical swords, space ships, enchanted scrolls, and other items used in massively-multiplayer online games are the objects of… 
2006
2006
The loss of productivity due to Spam has reached a critical limit. Spoof emails have dented confidence of people in…