نتایج جستجو برای: sms spam
تعداد نتایج: 9102 فیلتر نتایج به سال:
Search engines have tried many techniques to filter out these spam pages before they can appear on the query results page. In Section 2 we present a collection of current methods that are being used to combat spam. We introduce a new approach to spam detection in Section 3 that uses semantic analysis of textual content as a means of detecting spam. This new approach uses a series of content ana...
This dissertation discusses techniques to improve the effectiveness and the efficiency of spam control. Specifically, layer-3 e-mail content classification is proposed to allow e-mail pre-classification (for fast spam detection at receiving e-mail servers) and to allow distributed processing at network nodes for fast spam detection at spam control points, e.g., at e-mail servers. Fast spam dete...
Spam messages are capable of carrying links to disconnected portions of the Internet. This paper looks the web as it is visible through URLs embedded in spam. We perform a study of spam using three sources: a spam honeypot, a group of high-spam student inboxes and a newsgroup devoted to posting spam messages. Our results show that 96% of spam links point to sites not reacheable by crawlers and ...
Spam is information crafted to be delivered to a large number of recipients, in spite of their wishes. A spam filter is an automated tool to recognize spam so as to prevent its delivery. The purposes of spam and spam filters are diametrically opposed: spam is effective if it evades filters, while a filter is effective if it recognizes spam. The circular nature of these definitions, along with t...
Identifying and detecting web spam is an ongoing battle between spam-researchers and spammers which has been going on since search engines allowed searching of web pages to the modern sharing of web links via social networks. A common challenge faced by spam-researchers is the fact that new techniques depend on requiring a corpus of legitimate and spam web pages. Although large corpora of legit...
The Internet’s current architecture de-couples the cost of sending traffic from the consequences of sending traffic. Its open nature allows anyone to initiate a connection with minimal authentication. These factors account for the excessive consumption caused by spam in the email system and other service areas. At the network layer, resource consumption caused by spam is analogous to Distribute...
Presence of spam tweets in a datasetmay affect the choices of feature selection, algorithm formulation, and system evaluation for many applications. However, most existing studies have not considered the impact of spam tweets. In this paper, we study the impact of spam tweets on hashtag recommendation for hyperlinked tweets (i.e., tweets containing URLs) in HSpam14 dataset. HSpam14 is a collect...
The concept of theme and rheme we want to propose in this paper is pragmatic in two senses of the wordz the theme/ theme structure (TRS) is viewed as a strategy of communication and thus belongs to pra~natics, and it seems to offer a pragmatic solution for a problem of machine translation. The starting-point of our considerations is defined by several arEuments claiming the ne@essity to preserv...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید