نتایج جستجو برای: spam emails

تعداد نتایج: 5808  

Journal: :CoRR 2012
Xinyu Xing Junho Ahn Wenke Lee Richard Han Shivakant Mishra

Recently, online video chat services are becoming increasingly popular. While experiencing tremendous growth, online video chat services have also become yet another spamming target. Unlike spam propagated via traditional medium like emails and social networks, we find that spam propagated via online video chat services is able to draw much larger attention from the users. We have conducted sev...

2011
Karen K. Nelson Brian R. Rountree

This study examines attention-driven investment decisions using a sample of firms essentially unknown to investors prior to becoming the target of a stock spam campaign. We show that the market reaction to spam varies predictably with the content of the spam message. Spam date returns and volume are significantly higher for stocks targeted by spam emails containing optimistic target price proje...

2008
André Bergholz Gerhard Paass Frank Reichartz Siehyun Strobel Marie-Francine Moens Brian Witten

Spam and phishing emails are not only annoying to users, but are a real threat to internet communication and web economy. The fight against unwanted emails has become a cat-and-mouse game between criminals and people trying to develop techniques for detecting such unwanted emails. Criminals are constantly developing new tricks and adopt the ones that make emails pass spam filters. We have devel...

2011
N. T. Mohammad

Spam email, is the practice of frequently sending unwanted email messages, usually with commercial content, in large quantities to a set of indiscriminate email accounts. However, since spammers continuously improve their techniques in order to compromise the spam filters, building a spam filter that can be incrementally learned and adapted became an active research field. Researches employed m...

2015
Reena Sharma Gurjot Kaur

Internet has become an important part of our lives which is used for nearly all purposes. Internet is like an umbrella providing various services at a single time. One of the important uses of this is, sharing of information. E-mails are the most commonly used utility of internet for communication. The emails contain some unsolicited mails called spam which create the problems for users .Detect...

Journal: :Indian Scientific Journal Of Research In Engineering And Management 2023

Malicious Uniform Resource Locators (URLs), or malicious websites, are one of the most common threats to web security. They host unwanted content (spam, malware, inappropriate ads, scams, etc.) Your visit this website may have been prompted by emails, advertisements, searches links from other websites. Either way, user must click on URL. The growing prevalence phishing, spam, and malware has le...

2005
Erhan J. Kartaltepe Shouhuai Xu

In this paper we explore the problem we call “malicious impostor emails.” Compared with the fairly well-known abuses such as spam and email worms, malicious impostor emails could be much more catastrophic because their payloads may directly target at the victim users’ cryptographic keys (via whatever means) and their content—except the malicious payload as an attachment—could look perfectly lik...

2007
Wanli Ma Dat Tran Dharmendra Sharma

based spam email filters available and also in operation. Yet we are still inundated with spam emails everyday. This is not because the filters are not powerful enough, but because the filtering systems are not flexible enough to adapt the new development of spam techniques, such as HTML tagging, image based spam, and keyword obfuscating etc. In this paper, we propose to use dynamic multiple no...

2003
Matthieu Maitre

The endlessly increasing volume of unsolicited emails (a.k.a. spam) has become more and more of a concern. Its hassles range from a daily loss of time for the end-user, required to keep her mailbox clean, to a financial loss for the ISPs, constantly in need of larger bandwidths and disk space. According to a recent study, MSN and AOL discard together almost five billion of such emails every day...

2007
KLAUS STEDING-JESSEN NANDAMUDI L. VIJAYKUMAR ANTONIO MONTES

One of the main problems in creating effective mechanisms to mitigate the spam problem is the lack of more precise data on it. This paper describes the design and implementation of a honeypotbased architecture to study the abuse of open proxies to send spam. The sensors were installed in Brazilian broadband networks and they captured more than 500 million emails over a period of 15 months. In t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید