نتایج جستجو برای: spam mails

تعداد نتایج: 5032  

Journal: :Inf. Process. Manage. 2014
Malcolm Clark Ian Ruthven Patrik O'Brian Holt Dawei Song Stuart N. K. Watt

This paper reports on an approach to the analysis of form (layout and formatting) during genre recognition recorded using eye tracking. The researchers focused on eight different types of e-mail, such as calls for papers, newsletters and spam, which were chosen to represent different genres. The study involved the collection of oculographic behaviour data based on the scanpath duration and scan...

2013
HaiLong Wang FanJun Meng HaiPeng Jia JinHong Cheng Jiong Xie

In order to evade the keyword filtering, the spammers insert comments into e-mails, such as unusual symbols # or ※, to divide some keywords. In the paper, one keyword filters method for spam via maximum independent sets is presented, and the main contents include: (1) build a matching relation matrix algorithm to help us to improve the performance of maximal independent sets; (2) develop a judg...

2012
Son T. Vuong Mohammed S. Alam

Today, our dependence on the internet has grown manifold. So has the need to protect our vast personal information accessible via web interfaces such as online passwords, corporate secrets, online banking accounts, and social networking accounts like Facebook. The appearance of botnets in the internet scene over the last decade, and their ever changing behavior has caused real challenges that c...

Journal: :پژوهش های کاربردی روانشناختی 0

there are strong relationship and common neural mechanism between working memory, short term storage, executive attention and fluid intelligence.  therefore we can consider these constructs as integrated construct as fluid cognition. to verify this claim, we implemented forward and backward digit and letter spam, visual memory spam. counting spam, stroop, wisconsin card, keep track and cattle i...

Journal: :research in applied linguistics 2012
gholam reza zarei masoomeh mohammadi

this paper reports the findings of a study designed to investigate english e-requestsof iranian efl postgraduate students (i.e., nonnative speakers of english) made totheir professors during their education at islamic azad university, najaf abadbranch, isfahan, iran, to find out types of politeness features employed in the students’e-mails and the extent to which these features might influence ...

2004
Sara de Freitas Mark Levene

............................................................................................................................. 3 INTRODUCTION: ..................................................................................................................... 3 PART ONE: THE PROGRESS OF SPAM ...................................................................................... 4 PART TWO: DEFIN...

Journal: :Al-Raida Journal 1970

Gholam Reza Zarei, Masoomeh Mohammadi

This paper reports the findings of a study designed to investigate English e-requestsof Iranian EFL postgraduate students (i.e., nonnative speakers of English) made totheir professors during their education at Islamic Azad University, Najaf AbadBranch, Isfahan, Iran, to find out types of politeness features employed in the students’e-mails and the extent to which these features might influence ...

2005
Edoardo M. Airoldi Bradley Malin Latanya Sweeney

Online criminals have adapted traditional snail mail and door-to-door fraudulent schemes into electronic form. Increasingly, such schemes target an individual's personal email, where they mingle among, and are masked by, honest communications. The targeting and conniving nature of these schemes are an infringement upon an individual's personal privacy, as well as a threat to personal safety. We...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید