Publication | Closed Access
Workload models of spam and legitimate e-mails
50
Citations
27
References
2006
Year
Spam FilteringComputational Social ScienceEngineeringInformation SecurityWorkload ModelsInformation ForensicsComputer ScienceInformation ManagementCommunicationSocial Engineering (Security)Phishing
| Year | Citations | |
|---|---|---|
1995 | 3.7K | |
1983 | 2.6K | |
1949 | 1.6K | |
1998 | 1.2K | |
2002 | 938 | |
2003 | 817 | |
2002 | 797 | |
1996 | 752 | |
2006 | 516 | |
2002 | 466 |
Page 1
Page 1