نتایج جستجو برای: spam emails

تعداد نتایج: 5808  

2010
Fernando Sanchez Zhenhai Duan Yingfei Dong

It is well known that spammers can forge the header of an email, in particular, the trace information carried in the Received: fields, as an attempt to hide the true origin of the email. Despite its critical importance for spam control and holding accountable the true originators of spam, there has been no systematic study on the forgery behavior of spammers. In this paper, we provide the first...

2006
Tsang-Hsiang Cheng Chih-Ping Wei

Spam, also known as Unsolicited Commercial Email (UCE), has been an increasingly annoying problem to individuals and organizations. Most of prior research formulated spam filtering as a classical text categorization task, in which training examples must include both spam emails (positive examples) and legitimate mails (negatives). However, in many spam filtering scenarios, obtaining legitimate ...

Journal: :IJISP 2008
Srikanth Palla Ram Dantu João W. Cangussu

Email spam is the most effective form of online advertising. Unlike telephone marketing, email spamming does not require huge human or financial resources investment. Most existing spam filtering techniques concentrate on the emails’ content. However, most spammers obfuscate their emails’ content to circumvent content-based spam filters. An integrated solution for restricting spam emails is nee...

2016
Biju Issac

Over the last years, unsolicited bulk mail, better known as spam, has become one of the most annoying problems of the Internet. The increase of spam emails uses bandwidth and fills up databases and therefore the global network becomes more crowded and less useful. Even though spam emails do not damage the data in the way that viruses do, they do harm the business intentions. For example, spam e...

Journal: :International Journal of Computer Applications Technology and Research 2016

Journal: :CoRR 2015
Alexander Schmidtke Hans-Joachim Hof

Unsolicited email (spam) is still a problem for users of the email service. Even though current email anti-spam solutions filter most spam emails, some still are delivered to the inbox of users. A special class of spam emails advertises websites, e.g., online dating sites or online pharmacies. The success rate of this kind of advertising is rather low, however, as sending an email does only inv...

2015
Siti-Hajar-Aminah Ali Seiichi Ozawa Junji Nakazato Tao Ban Jumpei Shimamura

In this paper, we propose a new online system that can quickly detect malicious spam emails and adapt to the changes in the email contents and the Uniform Resource Locator (URL) links leading to malicious websites by updating the system daily. We introduce an autonomous function for a server to generate training examples, in which double-bounce emails are automatically collected and their class...

2014
Abu Awal Md Shoeb Dibya Mukhopadhyay Shahid Al Noor Alan Sprague Gary Warner

A substantial majority of the email sent everyday is spam. Spam emails cause many problems if someone acts or clicks on the link provided in the email body. The problems may include infecting users personal machine with malware, stealing personal information, capturing credit card information, etc. Since spam emails are generated as a part of a very limited numbers of spam campaigns, it is usef...

2015
Mina Sheikh Alishahi Andrea Saracino Mohamed Mejri Nadia Tawbi Fabio Martinelli

Spam emails yearly impose extremely heavy costs in terms of time, storage space and money to both private users and companies. Finding and persecuting spammers and eventual spam emails stakeholders should allow to directly tackle the root of the problem. To facilitate such a difficult analysis, which should be performed on large amounts of unclassified raw emails, in this paper we propose a fra...

2016
Akash Wagh Shipra Arya Sonal Patil Dhanashri Joshi

ARTICLE INFO Spam is one of the major issue especially email spam, of the todays Internet resulting in financial damage to companies and annoying the users and managing such kind of the mailbox has become a crucial one. These unwanted emails clogs the inbox as well as can be used for various attacks which may destroy user’s information or to reveal his/her identity or data. In this paper we hav...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید