2020
DOI: 10.31987/ijict.3.1.83
|View full text |Cite
|
Sign up to set email alerts
|

Digital Cyber Forensic Email Analysis and Detection Based on Intelligent Techniquesinvestigation

Abstract: The Internet has become open, public and widely used as a source of data transmission and exchanging messages between criminals, terrorists and those who have illegal motivations.  Moreover, it can be used for exchanging important data between various military and financial institutions, or even ordinary citizens. One of the important means of exchanging information widely used on the Internet medium is the e-mail. Email messages are digital evidence that has been become one of the important means to adopt by … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 6 publications
(7 reference statements)
0
4
0
Order By: Relevance
“…Two stages of SMTP are used, one between the sender and the mail server, and another between the sender's server and the receiver's server. Since SMTP is a push protocol and a pull protocol is required at the receiver's end, either POP3 or IMAP4 can be used between the receiver's mail server and the receiver [10][11][12][13][14][15][16]. When sending messages between a client and a server, SMTP uses commands and responses.…”
Section: Email Systemmentioning
confidence: 99%
See 3 more Smart Citations
“…Two stages of SMTP are used, one between the sender and the mail server, and another between the sender's server and the receiver's server. Since SMTP is a push protocol and a pull protocol is required at the receiver's end, either POP3 or IMAP4 can be used between the receiver's mail server and the receiver [10][11][12][13][14][15][16]. When sending messages between a client and a server, SMTP uses commands and responses.…”
Section: Email Systemmentioning
confidence: 99%
“…Fraud is defined as purposeful deceit committed over email for the perpetrator's advantage or to inflict harm to others [15]. The email content comprises an offer needing little capital with a large profit margin or a sale of valuable items at a reduced price.…”
Section: Email Abuse Scenarios and Threats In Email Communicationmentioning
confidence: 99%
See 2 more Smart Citations