نتایج جستجو برای: mobile spam

تعداد نتایج: 175069  

2012
K. Srikanth

–While email is one of the fastest form of communication, the user is frequently faced with receiving unsolicited emails called spams. Nonspam mails are known as hams which are legitimate mails. It is practically very difficult to perfectly classify a mail into spam or ham basing on the content or subject of the mail. Several statistical methods are available which classify mails with some chan...

Journal: :International Journal of Computer Applications 2016

Journal: :J. UCS 2012
Ickin Vural Hein S. Venter

Malicious software (malware) infects large numbers of mobile devices. Once infected these mobile devices may be involved in many kinds of online criminal activity, including identity theft, unsolicited commercial SMS messages, scams and massive coordinated attacks. Until recently, mobile networks have been relatively isolated from the Internet, so there has been little need to protect them agai...

2014
M. Karpagavalli K. Mythili

Mobile communication systems are becoming increasingly significant and ubiquitous in people’s daily lives. Due to the enormous growth in mobile devices, virus propagation in mobile virus is an important security concern. A mobile virus is nothing but malicious computer software that targets mobile phones and causing the collapse of the system and leakage of confidential information. In the wire...

2015
Sneha Singh Sandeep Kaur

Spam is no more garbage but risk as it includes virus attachments and spyware agents which make the recipients’ system ruined, therefore, there is an emerging need for spam detection. Many spam detection techniques based on machine learning algorithms have been proposed. As the amount of spam has been increased tremendously using bulk mailing tools, spam detection techniques should deal with it...

2006
Flavio D. Garcia Jaap-Henk Hoepman Jeroen van Nieuwenhuizen

Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, have been proposed. In this paper we investigate the effectiveness of several spam filtering techniques and technologies. Our analysis was performed by simulating email traffic under different conditions. We show that ge...

2004
Flavio D. Garcia Jaap-Henk Hoepman Jeroen van Nieuwenhuizen

Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, have been proposed. In this paper we investigate the effectiveness of several spam filtering techniques and technologies. Our analysis was performed by simulating email traffic under different conditions. We show that ge...

2006
Daniel Povey

The Subspace Precision and Mean model (SPAM) is a way of representing Gaussian precision and mean values in a reduced dimension. This paper presents some large vocabulary experiments with SPAM and introduces an efficient way to optimize the SPAM basis. We present experiments comparing SPAM, diagonal covariance and full covariance models on a large vocabulary task. We also give explicit formulae...

Journal: :Journal of physics 2023

Abstract The enormous computing tasks in the Mobile Edge Computing (MEC) beget challenges correlated with cost, energy consumption and quality of service. However, existing studies are not optimized enough for MEC terms selection task classification scheduling schemes. Inspired by spam idea, a novel scheme is proposed via Bayesian Classifier. first categorized into three priority categories usi...

Journal: :Human factors 2012
Russell S. Pierce

OBJECTIVE The objective of this study was to determine whether administration of the situation present assessment method (SPAM) affects workload and/or task performance. BACKGROUND SPAM probes are thought to isolate workload from the assessment of situation awareness (SA) by including a warning signal before asking an SA-related question. However, there is a good reason to think that SPAM may...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید