نتایج جستجو برای: anti spam

تعداد نتایج: 365263  

2003
Steven L. Lima William A. Mitchell Timothy C. Roth

Hundreds of studies exist on predator foraging behaviour, and the same holds for anti-predator behaviour in prey. However, despite these many studies, almost nothing is known about diet choice by predators that feed on prey with anti-predator behaviour. We addressed this problem theoretically by incorporating anti-predator vigilance into two classical models of diet choice by predators. Vigilan...

2006
Richard Mulgan Satish Chand Peter Larmour

About the P About the P About the P About the P About the Policy Briefs olicy Briefs olicy Briefs olicy Briefs olicy Briefs This year the Crawford School of Economics and Government established an exciting series of Policy Briefs that provide three opinion pieces by researchers on a particular theme or topic. These briefs are designed to provide introductions into key public policy areas that a...

Journal: :CoRR 2009
M. Tariq Banday Tariq R. Jan

Spam is not only clogging the Internet traffic by consuming a hefty amount of network bandwidth but it is also a source for e-mail born viruses, spyware, adware and Trojan Horses. It is also used to carry out denial of service, directory harvesting and phishing attacks that directly cause financial losses. Further, the contents of spam are often offensive and contain adult oriented and fraudule...

2012
Paulo Cortez Rui Vaz Miguel Rocha Miguel Rio Pedro Sousa

This work presents a symbiotic filtering approach enabling the exchange of relevant word features among different users in order to improve local anti-spam filters. The local spam filtering is based on a ContentBased Filtering strategy, where word frequencies are fed into a Naive Bayes learner. Several Evolutionary Algorithms are explored for feature selection, including the proposed symbiotic ...

2006
Ioannis Kanaris Konstantinos Kanaris Efstathios Stamatatos

This paper presents a content-based approach to spam detection based on low-level information. Instead of the traditional 'bag of words' representation, we use a 'bag of character n-grams' representation which avoids the sparse data problem that arises in n-grams on the word-level. Moreover, it is language-independent and does not require any lemmatizer or 'deep' text preprocessing. Based on ex...

2006
Anirudh Ramachandran David Dagon Nick Feamster

Many Internet Service Providers (ISPs), anti-virus companies, and enterprise email vendors use Domain Name System-based Blackhole Lists (DNSBLs) to keep track of IP addresses that originate spam, so that future emails sent from these IP addresses can be rejected out-of-hand. DNSBL operators populate blocking lists based on complaints from recipients of spam, who report the IP address of the rel...

2000
J. SALERNO

Michael Dummett’s realism debate is a semantic dispute about the kind of truth conditions had by a given class of sentences. According to his semantic realist, the truth conditions are potentially verification-transcendent in that they may obtain (or not) despite the fact that we may be forever unable to recognize whether they obtain. According to Dummett’s semantic anti-realist, the truth cond...

Journal: :The Journal of The Institute of Electrical Engineers of Japan 2008

Journal: :CoRR 2004
P. Oscar Boykin Vwani P. Roychowdhury

We provide an automated graph theoretic method for identifying individual users’ trusted networks of friends in cyberspace. We routinely use our social networks to judge the trustworthiness of outsiders, i.e., to decide where to buy our next car, or to find a good mechanic for it. In this work, we show that an email user may similarly use his email network, constructed solely from sender and re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید