نتایج جستجو برای: sms spam

تعداد نتایج: 9102  

2014
Cédric Lopez Reda Bestandji Mathieu Roche Rachel Panckhurst

In this paper, we propose a method for aligning text messages (entitled AlignSMS) in order to automatically build an SMS dictionary. An extract of 100 text messages from the 88milSMS corpus (Panckhurst el al., 2013, 2014) was used as an initial test. More than 90,000 authentic text messages in French were collected from the general public by a group of academics in the south of France in the co...

Journal: :JGIM 2014
Eduardo Henrique Diniz Martin Jayo Marlei Pozzebon Frédéric Lavoie Flávio Henrique dos Santos Foguel

Finding ways to downscale microfinance is one of the current challenges facing commercial banks, especially in developing countries. As banks have a poor knowledge of microfinance, operating in this market will require capacity-building, innovative business models and new technological architectures. This paper discusses how one particular architecture – the Brazilian model of correspondent ban...

2012
Arnaud Kirsch

Textual Compression Based on Rules Arising from a Corpus of Text Messages The present research seeks to reduce the size of text messages on the basis of compression techniques observed mostly in a corpus of sms. This paper explains the methodology followed to establish compression rules. It then presents the 33 considered rules, and illustrates the four suggested levels of compression with two ...

2009
Holly Esquivel Tatsuya Mori Aditya Akella

Email spam has become costly and difficult to manage in recent years. Many of the mechanisms used for controlling spam are located at local SMTP servers and end-host machines. These mechanisms can place a significant burden on mail servers and end-host machines as the number spam messages received continues to increase. We propose a preliminary architecture that applies spam detection filtering...

2017

Unsolicited emails, known as spam, are one of the fast growing and costly problems associated with the Internet today. Among the many proposed solutions, a technique using Bayesian filtering is considered as the most effective weapon against spam. Bayesian filtering works by evaluating the probability of different words appearing in legitimate and spam mails and then classifying them based on t...

2007
Timothy Jones David Hawking Ramesh Sankaranarayana

Web spam potentially causes three deleterious effects: unnecessary work for crawlers and search engines; diversion of traffic away from legitimate businesses; and annoyance to search engine users through poorer results. Past research on web spam has focused on spamming techniques, spam suppression techniques, and methods for classifying web content as spam or non-spam. Here we focus on the dete...

2017
Seongsoon Kim Seongwoon Lee Donghyeon Park Jaewoo Kang

Opinion spam, intentionally written by spammers who do not have actual experience with services or products, has recently become a factor that undermines the credibility of information online. In recent years, studies have attempted to detect opinion spam using machine learning algorithms. However, limitations of goldstandard spam datasets still prove to be a major obstacle in opinion spam rese...

2007
Karel Jezek Jiri Hynek

The paper presents a brief survey of the fight between spammers and antispam software developers, and also describes new approaches to spam filtering. In the first two sections we present a survey of the currently existing spam types. Some well-mapped spammer tricks are also described, although the imagination of spam distributors is endless, and therefore only the most common tricks are covere...

2006
Morton Swimmer Ian Whalley Barry Leiba Nathaniel S. Borenstein

The existance of networks of ‘bots’ raises the possibility of a new type of spam that breaks the current paradigm of spam defense, in which the defence acts purely as a filter. This spam, which we call parasitic spam, looks to a filter very much like spam with scraped text, but contains instead legitimate content going from a legitimate sender to a legitimate recipient. In this problem statemen...

Journal: :BMJ 2008

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید