نتایج جستجو برای: sms spam

تعداد نتایج: 9102  

2013
Vinod Patidar Anju Singh

Email spam is one of the unsolved problems of the today's Internet, annoying individual users and bringing financial damage to companies. Among the approaches developed to stop spam emails, filtering is a popular and important one. Common uses for email filters include organizing incoming email and computer viruses and removal of spam. As spammers periodically find new ways to bypass spam filte...

Journal: :CoRR 2008
Dhinaharan Nagamalai Beatrice Cynthia Dhinakaran Jae-Kwang Lee

Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant increase in spam traffic. Spam messes up user’s inbox, consumes network resources and spread worms and viruses. In this paper we study the characteristics of spam and the technology used by spammers. In order to counter ...

2011
Jussi Parikka Tony D. Sampson

The joke, of course, refers to Spam, the canned food substance that originated in the 1930s in the United States, but was famously imported into Britain during World War II.1 Spam (spiced ham) became a cheap supplement for pure meat products, which were in severe shortage during the conflict. Perhaps the cheapness and mass consumption of Spam during the period are among the reasons why it becam...

2005
PENG LIU GUANGLIANG CHEN LIANG YE WEIMING ZHONG

The spam problem is getting worse all the time. In the paper, we propose Anti-Spam Grid, which can collaboratively filter spam messages by forming a virtual organization. We discuss the design of fuzzy CopyRank and distributed Bayesian algorithm, and describe the architecture of Anti-Spam Grid. A detailed analysis shows that the system is reliable, efficient and scalable, and an experiment show...

2014
Kamini Bajaj Josef Pieprzyk

There are number of Anti-Spam filters that have reduced the amount of email spam in the inbox but the problem still continues as the spammers circumvent these techniques. The problems need to be addressed from different aspects. Major problem for instance arises when these anti-spam techniques misjudge or misclassify legitimate emails as spam (false positive); or fail to deliver or block spam o...

2009
Jose-Marcio Martins da Cruz Gordon V. Cormack

Email spam filters are commonly trained on a sample of recent spam and ham (non-spam) messages. We investigate the effect on filter performance of using samples of spam and ham messages sent months before those to be filtered. Our results show that filter performance deteriorates with the overall age of spam and ham samples, but at different rates. Spam and ham samples of different ages may be ...

2010
Fernando Sanchez Zhenhai Duan Yingfei Dong

It is well known that spammers can forge the header of an email, in particular, the trace information carried in the Received: fields, as an attempt to hide the true origin of the email. Despite its critical importance for spam control and holding accountable the true originators of spam, there has been no systematic study on the forgery behavior of spammers. In this paper, we provide the first...

2003
Terri Oda Tony White

Spam, the electronic equivalent of junk mail, affects over 600 million users worldwide. Even as anti-spam solutions change to limit the amount of spam sent to users, the senders adapt to make sure their messages are seen. This paper looks at application of the artificial immune system model to protect email users effectively from spam. In particular, it tests the spam immune system against the ...

Journal: :Computer Communications 2011
Zhenhai Duan Kartik Gopalan Xin Yuan

In this paper we present a detailed study of the behavioral characteristics of spammers based on a two-month email trace collected at a large US university campus network. We analyze the behavioral characteristics of spammers that are critical to spam control, including the distributions of message senders, spam and non-spam messages by spam ratios; the statistics of spam messages from differen...

Journal: :IJDCF 2009
Chengcui Zhang Xin Chen Wei-bang Chen Lin Yang Gary Warner

In this article, we propose a spam image clustering approach that uses data mining techniques to study the image attachments of spam emails with the goal to help the investigation of spam clusters or phishing groups. Spam images are first modeled based on their visual features. In particular, the foreground text layout, foreground picture illustrations and background textures are analyzed. Afte...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید