Table of Contents

 1     Scope            
 2     References   
 3     Definitions   
        3.1     Terms defined elsewhere
        3.2     Terms defined in this supplement 
 4     Abbreviations and acronyms  
 5     Conventions
 6     Overview of mobile messaging spam     
        6.1     Types 
        6.2     Characteristics  
        6.3     Delivery methods             
 7     Current technologies for countering mobile messaging spam           
        7.1     Blacklists/whitelists         
        7.2     Content-based filtering   
        7.3     Spam reporting 
        7.4     Traffic statistics               
        7.5     Analysis of call detail records        
        7.6     Greylisting         
        7.7     Duplicate content recognition       
        7.8     Indication information recognition              
        7.9     Analysis of messaging sending dispersion   
       7.10     Limitation on the total amount of sent messages    
       7.11     Security software            
 8     Analysis for countering mobile messaging spam 
        8.1     Comparison      
        8.2     Deployment framework 
Appendix I – Activities on countering mobile messaging spam    
        I.1     Development of technical specifications for countering mobile messaging spam              
        I.2     International activities on countering mobile messaging spam               
        I.3     Industry alliances and initiatives for countering mobile messaging spam            
Bibliography