dc.contributor.author |
Nakulas, A |
en |
dc.contributor.author |
Ekonomou, L |
en |
dc.contributor.author |
Kourtesi, S |
en |
dc.contributor.author |
Fotis, GP |
en |
dc.contributor.author |
Zoulias, E |
en |
dc.date.accessioned |
2014-03-01T02:51:55Z |
|
dc.date.available |
2014-03-01T02:51:55Z |
|
dc.date.issued |
2009 |
en |
dc.identifier.issn |
18761100 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/35751 |
|
dc.subject.other |
E-mail (spam) |
en |
dc.subject.other |
Internet telephony |
en |
dc.subject.other |
Telephone systems |
en |
dc.subject.other |
Internet |
en |
dc.title |
A review of techniques to counter spam and spit |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1007/978-0-387-84814-3_50 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1007/978-0-387-84814-3_50 |
en |
heal.publicationDate |
2009 |
en |
heal.abstract |
This paper studies the most important techniques with which to challenge the problem of unsolicited e-mails (spam) and unsolicited messages in Internet telephony (spit). First an introduction to the problem of spam demonstrates the importance (economic and technological) of finding a solution. Then we analyze the most important techniques that exist to counter the problem. After that we concentrate on a new problem: spam using new internet telephony technologies (spit). This problem, even if existing only theoretically until now, very soon will be one of the main factors affecting the broad use of VoIP. We analyze the most important methods and techniques of countering spit. Finally, we mentione differences between spam and spit and state some useful conclusions. © 2009 Springer Science+Business Media, LLC. |
en |
heal.journalName |
Lecture Notes in Electrical Engineering |
en |
dc.identifier.doi |
10.1007/978-0-387-84814-3_50 |
en |
dc.identifier.volume |
27 LNEE |
en |
dc.identifier.issue |
VOL.1 |
en |
dc.identifier.spage |
501 |
en |
dc.identifier.epage |
510 |
en |