نتایج جستجو برای: spam mails
تعداد نتایج: 5032 فیلتر نتایج به سال:
This paper reports on an approach to the analysis of form (layout and formatting) during genre recognition recorded using eye tracking. The researchers focused on eight different types of e-mail, such as calls for papers, newsletters and spam, which were chosen to represent different genres. The study involved the collection of oculographic behaviour data based on the scanpath duration and scan...
In order to evade the keyword filtering, the spammers insert comments into e-mails, such as unusual symbols # or ※, to divide some keywords. In the paper, one keyword filters method for spam via maximum independent sets is presented, and the main contents include: (1) build a matching relation matrix algorithm to help us to improve the performance of maximal independent sets; (2) develop a judg...
Today, our dependence on the internet has grown manifold. So has the need to protect our vast personal information accessible via web interfaces such as online passwords, corporate secrets, online banking accounts, and social networking accounts like Facebook. The appearance of botnets in the internet scene over the last decade, and their ever changing behavior has caused real challenges that c...
there are strong relationship and common neural mechanism between working memory, short term storage, executive attention and fluid intelligence. therefore we can consider these constructs as integrated construct as fluid cognition. to verify this claim, we implemented forward and backward digit and letter spam, visual memory spam. counting spam, stroop, wisconsin card, keep track and cattle i...
this paper reports the findings of a study designed to investigate english e-requestsof iranian efl postgraduate students (i.e., nonnative speakers of english) made totheir professors during their education at islamic azad university, najaf abadbranch, isfahan, iran, to find out types of politeness features employed in the students’e-mails and the extent to which these features might influence ...
............................................................................................................................. 3 INTRODUCTION: ..................................................................................................................... 3 PART ONE: THE PROGRESS OF SPAM ...................................................................................... 4 PART TWO: DEFIN...
This paper reports the findings of a study designed to investigate English e-requestsof Iranian EFL postgraduate students (i.e., nonnative speakers of English) made totheir professors during their education at Islamic Azad University, Najaf AbadBranch, Isfahan, Iran, to find out types of politeness features employed in the students’e-mails and the extent to which these features might influence ...
Online criminals have adapted traditional snail mail and door-to-door fraudulent schemes into electronic form. Increasingly, such schemes target an individual's personal email, where they mingle among, and are masked by, honest communications. The targeting and conniving nature of these schemes are an infringement upon an individual's personal privacy, as well as a threat to personal safety. We...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید