نتایج جستجو برای: visual memory spam counting spam

تعداد نتایج: 637246  

Journal: :IJWIS 2009
Maria Soledad Pera Yiu-Kai Ng

Purpose The Web provides its users with abundant information. Unfortunately, when a Web search is performed, both users and search engines must deal with an annoying problem: the presence of spam documents that are ranked among legitimate ones. The mixed results downgrade the performance of search engines and frustrate users who are required to filter out useless information. To improve the qua...

2009
Marc Najork

Definition Web spam refers to a host of techniques to subvert the ranking algorithms of web search engines and cause them to rank search results higher than they would otherwise. Examples of such techniques include content spam (populating web pages with popular and often highly monetizable search terms), link spam (creating links to a page in order to increase its linkbased score), and cloakin...

2004
ABST RACT

................................................................................................................................... I CHAPTER 1 BACKGROUND .................................................................................................... 2 BACKGROUND INFORMATION............................................................................................ 2 CONTEXT OF RESEARCH .....

Journal: :JDFSL 2010
Chun Wei Alan Sprague Gary Warner Anthony Skjellum

Spam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the identification and disruption of the supporting infrastructure used by spammers is a more effective way of stopping spam than filtering. The termination of spam hosts will greatly reduce the profit a spammer can generate and thwart his ability to s...

2012
Raja Ramesh

With the increasing popularity of a E-mail users, E-mail spam problem growing proportionally. Spam filtering with near duplicate matching scheme is widely discussed in recent years. It is based on a known spam database formed by user feedback which cannot fully catch the evolving nature of spam and also it requires much storage. In view of above drawbacks, we proposed an effective spam detectio...

Journal: :JCP 2012
Qiu-yu Zhang Peng Wang Hui-juan Yang

The effect of spam filtering method based on statistics is not good enough in filtering the new-type spam with synonymous substitution and camouflage, because the method based on statistics ignores the semantic relation between words in the text, and only judges from the word itself. So, a method of spam filtering based on the semantic body is proposed in this paper. The method adopts lexical c...

2012
N. S. Kumar

Now-a-days, mailbox management has become a big task. A large proportion of the emails we receive are spam. These unwanted emails clog the inbox and are very ubiquitous. Here, a new technique for spam detection is presented that makes use of clustering and association rules generated by the Apriori algorithm. Vector space notation is used to represent the emails. The results obtained from exper...

2007
Battista Biggio Giorgio Fumera Ignazio Pillai Fabio Roli

We address the problem of filtering image spam, a rapidly spreading kind of spam in which the text message is embedded into attached images to defeat spam filtering techniques based on the analysis of e-mail’s body text. We propose an approach based on low-level image processing techniques to detect one of the main characterstics of most image spam, namely the use of content obscuring technique...

2006
Eilon Solan Eran Reshef

We provide a model to study the effects of three methods of fighting spam mail, namely (1) increasing the cost of mailing messages, (2) filters, and (3) a do-not-spam registry, on the number of spam messages that users receive, and on the efficiency of the internet (measured by the total number of spam messages spammers send).

Journal: :IJISP 2011
Archana Bhattarai Dipankar Dasgupta

This paper studies the problems and threats posed by a type of spam in the blogosphere, called blog comment spam. It explores the challenges introduced by comment spam, generalizing the analysis substantially to any other short text type spam. The authors analyze different high-level features of spam and legitimate comments based on the content of blog postings. The authors use these features t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید