نتایج جستجو برای: spam mails
تعداد نتایج: 5032 فیلتر نتایج به سال:
Online criminals have adapted traditional snail mail and door-to-door fraudulent schemes into electronic form. Increasingly, such schemes target an individual’s personal email, where they mingle among, and are masked by, honest communications. The targeting and conniving nature of these schemes are an infringement upon an individual’s personal privacy, as well as a threat to personal safety. In...
E-mail communication is a narrative challenging in present days, because a problem can be done in that communication from one to other emails process generation. The problem is spam mail combination in original mail interaction. This is the major task for sending information from one to other persons, if it important to that particular person. So to solve these problems effectively traditionall...
Using Psychological Reactance as the framework, this study sought to understand consumer attitudes towards two major direct marketing techniques: unsolicited commercial e-mail and postal direct mail. In particular, audience perceptions of advertising intrusiveness, perceived loss of control (as conceptualized by Psychological Reactance), and irritation regarding the direct marketing techniques ...
Malwares are malignant softwares. It is designed to damage computer systems without the knowledge of the owner using the system. Softwares from reputable vendors also contain malicious code that affects the system or leaks informations to remote servers. Malwares includes computer viruses, Worms, spyware, dishonest ad-ware, rootkits, Trojans, dialers etc. Malware is one of the most serious secu...
Classification of given data sets according to a training set is one of the essentials bread and butter tools in machine learning. There are several application scenarios, reaching from the detection of spam and non-spam mails to recognition of malicious behavior, or other forensic use cases. To this end, there are several approaches that can be used to train such classifiers. Often, scientists...
A new system for spam e-mail annotation by end-users is presented. It is based on the recursive application of hand-written annotation rules by means of an inferential engine based on Logic Programming. Annotation rules allow the user to express nuanced considerations that depend on deobfuscation, word (non)occurrence and structure of the message in a straightforward, human-readable syntax. We ...
Resumo—A classificação automática de SMS spam é um problema desafiador, pois ao contrário de outros documentos (como e-mails, por exemplo), esses textos são extremamente curtos, com no máximo 140 caracteres. Além disso, eles normalmente são escritos utilizando gírias, abreviaturas e símbolos como emoticons. Técnicas de pré-processamento tem sido aplicadas para contornar esse problema, como o us...
In recent years, there has been a steep rise in the amount of unsolicited-emails (spams) [11]. Such mails overwhelm users’ mailboxes, consume server resources and cause delays to mail delivery. Many techniques [2, 10, 12, 5, 13] have been used for mitigating spams. Despite the plethora of schemes proposed, all of them have the cardinal problem of false positives which compromises the reliabilit...
Resumo—Nos últimos anos, a popularização dos celulares e smartphones impulsionou o uso de SMS como forma alternativa e barata de comunicação. O crescimento de adeptos ao serviço aliado a alta confiança que os usuários possuem nesses tipos de mensagens, vêm atraindo a atenção de pessoas e empresas mal intencionadas, conhecidas como spammers. O spam nesse contexto representa um problema para os m...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید