نتایج جستجو برای: mobile spam

تعداد نتایج: 175069  

2011
Enhua Tan Lei Guo Songqing Chen Xiaodong Zhang

Spam content is surging with an explosive increase of user generated content (UGC) on the Internet. Spammers often insert popular keywords or simply copy and paste recent articles from the Web with spam links inserted, attempting to disable content-based detection. In order to effectively detect spam in user generated content, we first conduct a comprehensive analysis of spamming activities on ...

2009
Christian Kreibich Chris Kanich Kirill Levchenko Brandon Enright Geoffrey M. Voelker Vern Paxson Stefan Savage

Over the last decade, unsolicited bulk email—spam— has evolved dramatically in its volume, its delivery infrastructure and its content. Multiple reports indicate that more than 90% of all email traversing the Internet today is considered spam. This growth is partially driven by a multi-billion dollar anti-spam industry whose dedication to filtering spam in turn requires spammers to recruit botn...

2014
Kanchan Hans Laxmi Ahuja S. K. Muttoo

Spam is a major threat to web security. The web of trust is being abused by the spammers through their ever evolving new tactics for their personal gains. In fact, there is a long chain of spammers who are running huge business campaigns under the web. Spam causes underutilization of search engine resources and creates dissatisfaction among web community. Web Security being a prime challenge fo...

2012
Wojciech Indyk Tomasz Kajdanowicz Przemyslaw Kazienko Slawomir Plamowski

The web spam detection problem was considered in the paper. Based on interconnected spam and no-spam hosts a collective classification approach based on label propagation is aimed at discovering the spam hosts. Each host is represented as network node and links between hosts constitute network’s edges. The proposed method provides reasonable results and is able to compute large data as is settl...

Journal: :IT Professional 2016
Chao Chen Jun Zhang Yang Xiang Wanlei Zhou Jonathan Oliver

T witter has become one of the most commonly used communication tools in daily life. With 500 million users, Twitter now generates more than 500 million tweets per day. However, its popularity has also attracted spamming. Spammers spread many intensive tweets, which can lure legitimate users to commercial or malicious sites containing malware downloads, phishing, drug sales, scams, and more.1 S...

2009
Jeongkyu Shin Seunghwan Kim

Spam filtering is one of the most challenging problems in electric message systems. In general, recent studies on specifying real spam source are based on content filtering because spammers usually falsify their origin. We propose a method to specify spam source based on structural analysis with complex network. We assume that each spam sources either has the same victim list or uses the same s...

2006
Carl J. Case Darwin L. King

During the past few years, spam has invaded electronic mail boxes and become one of the major challenges for information systems (IS) professionals. Spam decreases user productivity, erodes electronic mail reliability, and requires the maintenance of spam-filtering software that drains the IS budget. Although spam is the largest type of electronic mail received, spam levels have begun to decrea...

2004
Geoff Hulten Anthony Penta Gopalakrishnan Seshadrinathan Manav Mishra

Introduction In this paper we analyze a very large junk e-mail corpus which was generated by a hundred thousand volunteer users of the Hotmail e-mail service. We describe how the corpus is being collected and then discuss how both the products being advertised by spam and the specific exploits being used to avoid spam filters have changed over time. Every day we randomly select one message from...

Journal: :J. Network and Computer Applications 2008
Eleni Georgiou Marios D. Dikaiakos Athena Stassopoulou

The main purpose of most spam e-mail messages distributed on Internet today is to entice recipients into visiting World Wide Web pages that are advertised through spam. In essence, e-mail spamming is a campaign that advertises URL addresses at a massive scale and at minimum cost for the advertisers and those advertised. Nevertheless, the characteristics of URL addresses and of web sites adverti...

2009
Jan Göbel Thorsten Holz Philipp Trinius

With increasing security measures in network services, remote exploitation is getting harder. As a result, attackers concentrate on more reliable attack vectors like email: victims are infected using either malicious attachments or links leading to malicious websites. Therefore efficient filtering and blocking methods for spam messages are needed. Unfortunately, most spam filtering solutions pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید