preview

Annotated Bibliography

Satisfactory Essays

RES 698/699 Class Participation: In-Progress Annotated Bibliography II Prabhakar Neupane (660251942) Article 1: Yu, S. (2015). Covert communication by means of email spam: A challenge for digital investigation. Digital Investigation, 13, 72-79. Article Topic: The article discusses the importance of analyzing spam emails, and says it cannot be emphasized enough. Most people tend to get confused between the junk and spam emails. This article focuses on digital investigations of malicious messages and different methods used by criminals in spamming unsuspecting users are also discussed. Applicability to the Thesis: • Provides useful definition of digital investigation or forensics. • Provides list of security issues. • Identifies key differences …show more content…

• Aims at understanding the behavior of spam accounts targeting Saudi Arabia. • Provides information on how to analyze the content of spam accounts. • Third party tools are used to control retweets. Article 4: Luong, E., Huynh, T., & Miller, J. (2012). On Spam Susceptibility and Browser Updating. International Journal of Systems and Service-Oriented Engineering (IJSSOE), 3(1), 44-57. Article Topic: A firsthand look at a case study is conducted where phony spam messages are sent to arbitrary email addresses. Visitor count is recorded and the collected information is analyzed and investigated. Results show that 70% of anonymous users across the world use outdated browsers making them more susceptible to spam. Applicability to the Thesis: • Provides useful classification of users susceptible to spam against users who use outdated browsers. • Provides list future research on spam mitigation. • Emphasizes on educating the public about “safe online behavior” and “best practices”. Article 5: Wei, C., Sprague, A., Warner, G., & Skjellum, A. (2010). Clustering Spam Domains and Destination Websites: Digital Forensics with Data Mining. Journal of Digital Forensics, Security and Law, 5(1),

Get Access