{"_id":"5655","file":[{"date_created":"2018-12-18T13:25:12Z","file_name":"Do anti-spam measures effectively cover the e-mail communication - Journal version.pdf","content_type":"application/pdf","relation":"main_file","file_id":"6324","creator":"hsiemes","file_size":100448,"date_updated":"2018-12-18T13:25:12Z","access_level":"open_access"}],"ddc":["000"],"date_created":"2018-11-14T14:51:41Z","type":"journal_article","author":[{"id":"72850","first_name":"Guido","last_name":"Schryen","full_name":"Schryen, Guido"}],"title":"Do anti-spam measures effectively cover the e-mail communication network? A formal approach","user_id":"61579","abstract":[{"lang":"eng","text":"Spam e-mails have become a serious technological and economic problem. Up to now, by deploying complementary anti-spam measures, we have been reasonably able to withstand spam e-mails and use the Internet for regular communication. However, if we are to avert the danger of losing the Internet e-mail service in its capacity as a valuable, free and worldwide medium of open communication, anti-spam activities should be performed more systematically than is currently the case regarding the mainly heuristic, anti-spam measures in place. A formal framework, within which the existing delivery routes that a spam e-mail may take, and anti-spam measures and their effectiveness can be investigated, will perhaps encourage a shift in methodology and pave the way for new, holistic anti-spam measures. This paper presents a model of the Internet e-mail infrastructure as a directed graph and a deterministic finite automaton and draws on automata theory to formally derive the spam delivery routes. The most important anti-spam measures are then described. Methods controlling only specific delivery routes are evaluated in terms of how effectively they cover the modeled e-mail infrastructure; methods operating independently of any particular routes receive a more general assessment."}],"page":"66-90","year":"2007","has_accepted_license":"1","keyword":["e-mail","spam","e-mail infrastructure","anti-spam measures","spamming options"],"volume":3,"language":[{"iso":"eng"}],"issue":"2","oa":"1","publication":"The Journal of Information Systems Security (AIS Special Interest Group in Security)","department":[{"_id":"277"}],"intvolume":" 3","date_updated":"2022-01-06T07:02:22Z","extern":"1","citation":{"short":"G. Schryen, The Journal of Information Systems Security (AIS Special Interest Group in Security) 3 (2007) 66–90.","ama":"Schryen G. Do anti-spam measures effectively cover the e-mail communication network? A formal approach. The Journal of Information Systems Security (AIS Special Interest Group in Security). 2007;3(2):66-90.","apa":"Schryen, G. (2007). Do anti-spam measures effectively cover the e-mail communication network? A formal approach. The Journal of Information Systems Security (AIS Special Interest Group in Security), 3(2), 66–90.","mla":"Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication Network? A Formal Approach.” The Journal of Information Systems Security (AIS Special Interest Group in Security), vol. 3, no. 2, 2007, pp. 66–90.","chicago":"Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication Network? A Formal Approach.” The Journal of Information Systems Security (AIS Special Interest Group in Security) 3, no. 2 (2007): 66–90.","ieee":"G. Schryen, “Do anti-spam measures effectively cover the e-mail communication network? A formal approach,” The Journal of Information Systems Security (AIS Special Interest Group in Security), vol. 3, no. 2, pp. 66–90, 2007.","bibtex":"@article{Schryen_2007, title={Do anti-spam measures effectively cover the e-mail communication network? A formal approach}, volume={3}, number={2}, journal={The Journal of Information Systems Security (AIS Special Interest Group in Security)}, author={Schryen, Guido}, year={2007}, pages={66–90} }"},"file_date_updated":"2018-12-18T13:25:12Z","status":"public"}