نتایج جستجو برای: spam emails

تعداد نتایج: 5808  

Journal: :J. Network and Computer Applications 2011
Zac Sadan David G. Schwartz

The performance of today’s email anti-spam systems is primarily measured by the percentage of false positives (non-spam messages detected as spam) rather than by the percentage of false negatives (real spam messages left unblocked). One reliable anti-spam technique is the Universal Resource Locator (URL)-based filter, which is utilized by most collaborative signature-based filters. URL-based fi...

Journal: :CoRR 2010
Farnaz Moradi Tomas Olovsson Philippas Tsigas

E-mail is probably the most popular application on the Internet, with everyday business and personal communications dependent on it. Spam or unsolicited e-mail has been estimated to cost businesses significant amounts of money. However, our understanding of the network-level behavior of legitimate e-mail traffic and how it differs from spam traffic is limited. In this study, we have passively c...

2004
Andreas Wetzel Roger Wattenhofer Nicolas Burri Keno Albrecht

In this thesis we present the Spamato Mail Proxy. Spamato is a collaborative spam filter system that acts as a stand alone component offering interfaces for mail clients and for spam filters. The Spamato Mail Proxy’s task is to allow for the connection of arbitrary mail clients to the spam filter system. Today’s email clients retrieve mails either through POP or IMAP. Therefore, the Spamato Mai...

2017
Mehdi Zekriyapanah Gashti

Spam emails is probable the main problem faced by most e-mail users. There are many features in spam email detection and some of these features have little effect on detection and cause skew detection and classification of spam email. Thus, Feature Selection (FS) is one of the key topics in spam email detection systems. With choosing the important and effective features in classification, its p...

Journal: :IJCBPL 2012
Zheng Yan Hamide Y. Gozu

Decision-making in the real world has been extensively studied, whereas decision-making in the cyber world is relatively unknown. The present study investigated how email users made their decisions to read or delete spam emails, unsolicited junk emails sent indiscriminately, when they received various kinds of emails in the everyday life. An experimental survey was designed to manipulate two va...

2010
Patrick Dwyer Zhenhai Duan

Email-based online phishing is one of the key security threats that greatly deteriorate the trustworthiness of the Internet. Although many spam filters have been developed and deployed, a non-negligible number of phishing emails still sneak into users’ inboxes each day. Phishing emails often contain suspicious information that separate them from the legitimate ones; however, average non-expert ...

Journal: :International Journal of Advanced Computer Science and Applications 2023

Since the advent of COVID-19, healthcare and IT cybersecurity have been an issue. Digital services foreign labor increased cyberattacks. July 2021 saw 260,642 phishing emails. 94% 12 countries’ employees experienced epidemic Phishing attacks steal sensitive data from spam emails or legitimate websites for profit. uses URL, domain, page, content variables. Simple machine-learning methods stop Th...

2007
N. J Croft

Unsolicited emails, more commonly known as spam, have plagued the use and efficiency of email since its inception. With the introduction of ungoverned cheap voice communications, such as IP telephony, spam over telephony (SPIT) and its prevention is set to dominate and drive whether the technology is widely adopted or not. A possible example of voice spam schemes includes the use of Interactive...

2014
Seongwook Youn

Email is one of common communication methods between people on the Internet. However, the increase of email misuse/abuse has resulted in an increasing volume of spam emails over recent years. An experimental system has been designed and implemented with the hypothesis that this method would outperform existing techniques, and the experimental results showed that indeed the proposed ontology-bas...

Journal: :AISS 2010
Yih-Jiun Lee

Since more networking technologies and communication channels have been developed, Internet users have moved their roles from being strictly information consumers to both information consumers and producers. Moreover, users on nets might also be intermediaries, inter-actors, interferences or message providers, even service providers. Information on the Internet is dramatically growing. On one h...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید