نتایج جستجو برای: mobile spam
تعداد نتایج: 175069 فیلتر نتایج به سال:
–While email is one of the fastest form of communication, the user is frequently faced with receiving unsolicited emails called spams. Nonspam mails are known as hams which are legitimate mails. It is practically very difficult to perfectly classify a mail into spam or ham basing on the content or subject of the mail. Several statistical methods are available which classify mails with some chan...
Malicious software (malware) infects large numbers of mobile devices. Once infected these mobile devices may be involved in many kinds of online criminal activity, including identity theft, unsolicited commercial SMS messages, scams and massive coordinated attacks. Until recently, mobile networks have been relatively isolated from the Internet, so there has been little need to protect them agai...
Mobile communication systems are becoming increasingly significant and ubiquitous in people’s daily lives. Due to the enormous growth in mobile devices, virus propagation in mobile virus is an important security concern. A mobile virus is nothing but malicious computer software that targets mobile phones and causing the collapse of the system and leakage of confidential information. In the wire...
Spam is no more garbage but risk as it includes virus attachments and spyware agents which make the recipients’ system ruined, therefore, there is an emerging need for spam detection. Many spam detection techniques based on machine learning algorithms have been proposed. As the amount of spam has been increased tremendously using bulk mailing tools, spam detection techniques should deal with it...
Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, have been proposed. In this paper we investigate the effectiveness of several spam filtering techniques and technologies. Our analysis was performed by simulating email traffic under different conditions. We show that ge...
Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, have been proposed. In this paper we investigate the effectiveness of several spam filtering techniques and technologies. Our analysis was performed by simulating email traffic under different conditions. We show that ge...
The Subspace Precision and Mean model (SPAM) is a way of representing Gaussian precision and mean values in a reduced dimension. This paper presents some large vocabulary experiments with SPAM and introduces an efficient way to optimize the SPAM basis. We present experiments comparing SPAM, diagonal covariance and full covariance models on a large vocabulary task. We also give explicit formulae...
Abstract The enormous computing tasks in the Mobile Edge Computing (MEC) beget challenges correlated with cost, energy consumption and quality of service. However, existing studies are not optimized enough for MEC terms selection task classification scheduling schemes. Inspired by spam idea, a novel scheme is proposed via Bayesian Classifier. first categorized into three priority categories usi...
OBJECTIVE The objective of this study was to determine whether administration of the situation present assessment method (SPAM) affects workload and/or task performance. BACKGROUND SPAM probes are thought to isolate workload from the assessment of situation awareness (SA) by including a warning signal before asking an SA-related question. However, there is a good reason to think that SPAM may...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید