Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Email spoofing

Known as: Hoax e-mail, Email hoax, Spoof Email 
Email spoofing is the creation of email messages with a forged sender address. Because the core email protocols do not have any mechanism for… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
  • H. Hu, G. Wang
  • USENIX Security Symposium
  • 2018
  • Corpus ID: 49316344
Spear phishing has been a persistent threat to users and organizations, and yet email providers still face key challenges to… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 4
  • figure 3
2018
2018
The email system is the central battleground against phishing and social engineering attacks, and yet email providers still face… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
2017
2017
In email systems, one of the most widely used attacks is email spoofing, in which the source address of the email message is… Expand
  • table I
  • figure 1
  • table III
  • figure 2
  • figure 3
2014
2014
A spammer needs three elements to run a spam operation: a list of victim email addresses, content to be sent, and a botnet to… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
2014
2014
Hoaxes are non-malicious viruses. They live on deceiving human’s perception by conveying false claims as truth. Throughout… Expand
  • table I
  • figure 1
  • table II
  • figure 2
  • figure 3
2013
2013
This study applies the speech acts theory to the study of discourse strategies and functions of hoax email business proposals… Expand
  • table 1
  • table 2
  • table 3
2010
2010
To launch a spoofing attack with emails we need to have knowledge of the techniques to launch an email spoofing attack. Spoofing… Expand
  • figure 1
2009
2009
Spam, also known as unsolicited bulk email (UBE), is becoming increasingly harmful for email traffics. Filtering is a simple and… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
2007
2007
Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread malware. Our goal is to present… Expand
  • figure 1
  • table 1
  • figure 3
  • table 2
  • table 3
2006
2006
Magical swords, space ships, enchanted scrolls, and other items used in massively-multiplayer online games are the objects of… Expand