نتایج جستجو برای: email

تعداد نتایج: 93671  

2012
Nir Ailon Zohar S. Karnin Edo Liberty

Viewing emails as parts of a sequence or a thread is a convenient way to quickly understand their context. It is therefore one of the most widely implemented and used features in mail clients, both web based and otherwise. Alas, current threading techniques are essentially limited to personal conversations which are human generated emails. In this paper we present the first, to our knowledge, s...

2014
Rashmi Hegde

Advances in the field of Information Technology make Information Security an inseparable part of it. In today's world, Electronic mail or e-mail is the one that is most prone to intrusions like phishing which acquires sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. In order to deal with security,...

2008
Vitor R. Carvalho Tom M. Mitchell Robert E. Kraut Lise Getoor

Email management has a fundamental role in modern work productivity. In this thesis we present evidence that email management can be potentially improved by the effective use of machine learning techniques to model different aspects of user intention. We initially propose a taxonomy of user intentions in terms of Speech Acts applied to email communication, or “email acts”, and show that email a...

2015
Carmen Frehner

15 1 Even though Jansen's NetLingo Internet Dictionary postulates the hyphenised spelling of the word email, i.e. " e-mail " , arguing that email is short for " electronic mail " , it will be spelt without a hyphen in this volume for the simple reason that the language of CMC tends to be reduced, so hyphens do not ¿ t in the concept of shortenings. Also, it can be recognised that people tend to...

2006
Ben Adida David Chau Susan Hohenberger Ronald L. Rivest

We present Lightweight Email Signatures (LES), a simple cryptographic architecture for authenticating email. LES is an extension of DKIM, the recent IETF effort to standardize domain-based email signatures. LES shares DKIM’s ease of deployment: they both use the DNS to distribute a single public key for each domain. Importantly, LES supports common uses of email that DKIM jeopardizes: multiple ...

2005
Joshua Goodman Vitor R. Carvalho

Implicit query systems examine a document and automatically conduct searches for the most relevant information. In this paper, we offer three contributions to implicit query research. First, we show how to use query logs from a search engine: by constraining results to commonly issued queries, we can get dramatic improvements. Second, we describe a method for optimizing parameters for an implic...

2010
Taiwo Ayodele Shikun Zhou Rinat Khusainov

In this paper we presents a neural network based system for automated email grouping into activities found in the email messageEmail Grouping Method (EGM). Email users spend a lot of time reading, replying and organizing their emails and this seems to be time consuming and sometimes can resolves to less performance of daily duty, and un-necessary distractions. A new system that can manage mails...

2003
Salvatore J. Stolfo Shlomo Hershkop Ke Wang Olivier Nimeskern Chia-Wei Hu

This paper describes the forensic and intelligence analysis capabilities of the Email Mining Toolkit (EMT) under development at the Columbia Intrusion Detection (IDS) Lab. EMT provides the means of loading, parsing and analyzing email logs, including content, in a wide range of formats. Many tools and techniques have been available from the fields of Information Retrieval (IR) and Natural Langu...

2006
Scott Garriss Michael Kaminsky Michael J. Freedman Brad Karp David Mazières Haifeng Yu

The explosive growth in unwanted email has prompted the development of techniques for the rejection of email, intended to shield recipients from the onerous task of identifying the legitimate email in their inboxes amid a sea of spam. Unfortunately, widely used contentbased filtering systems have converted the spam problem into a false positive one: email has become unreliable. Email acceptance...

Journal: :Digital Investigation 2015
Frederik Armknecht Andreas Dewald

In many digital forensic investigations, email data needs to be analyzed. However, this poses a threat to the privacy of the individual whose emails are being examined and in particular becomes a problem if the investigation clashes with privacy laws. This is commonly addressed by allowing the investigator to run keyword searches and to reveal only those emails that contain at least some of the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید