作者: Boris Yanovsky , Scott Eikenberry
DOI:
关键词: Telecommunications network 、 Computer security 、 Internet privacy 、 Political science 、 Reputation
摘要: Information concerning a plurality of identified threats provided by preselected sources is stored in memory. An e-mail message may be received over communication network. The separated into components. information searched to identify reputation score associated with each the It then determined whether threat based on determination sent designated recipient.