1. Khanji, S., Jabir, R., Ahmad, L., Alfandi, O., Said, H.: Evaluation of Linux SMTP server security aspects??? a case study. In: 2016 7th International Conference on Information and Communication Systems (ICICS), pp. 252–257. IEEE (2016)
2. Lin, S.C., Wen, C.Y., Sethares, W.A.: Two-tier device-based authentication protocol against PUEA attacks for IoT applications. IEEE Trans. Signal Inf. Process. Over Netw. PP(99), 1 (2017)
3. Babrahem, A.S., Alharbi, E.T., Alshiky, A.M., Alqurashi, S.S., Kar, J., et al.: Study of the security enhancements in various e-mail systems. J. Inf. Secur. 6(01), 1 (2014)
4. Zadgaonkar, A., Kashyap, S., Patel, M.C.: Developing a model to detect e-mail address spoofing using biometrics technique. Int. J. Sci. Mod. Eng. (IJISME) (2013). ISSN: 2319–6386
5. Fiebig, T., Lichtblau, F., Streibelt, F., Krueger, T., Lexis, P., Bush, R., Feldmann, A.: Sok: an analysis of protocol design: avoiding traps for implementation and deployment. arXiv preprint arXiv:1610.05531 (2016)