Controlling spam and spear phishing via peered network overlays and non-repudiable traceback | IEEE Conference Publication | IEEE Xplore