نتایج جستجو برای: visual memory spam counting spam

تعداد نتایج: 637246  

2007
Christoph Krammer Felix C. Freiling Christian Koziol Thorsten Holz

Stock spam is a part of unsolicited electronic mail which wants its receiver to buy a certain share at the stock markets. As there is no direct profit for the sender of this message, impacts on the share prices seem to be the only way to generate earnings by the spam sender. To hide the information within stock spam messages from automatic processing, textual and image-based distortions are use...

2009
John P. John Alexander Moshchuk Steven D. Gribble Arvind Krishnamurthy

In this paper we present Botlab, a platform that continually monitors and analyzes the behavior of spamoriented botnets. Botlab gathers multiple real-time streams of information about botnets taken from distinct perspectives. By combining and analyzing these streams, Botlab can produce accurate, timely, and comprehensive data about spam botnet behavior. Our prototype system integrates informati...

2014
Kavita Patel Soma Halder Richa Tiwari Alan Sprague Marios Kokkodis Ting-Kai Huang Anthony Skjellum

This paper attempts to develop an algorithm to recognize spam domains using data mining techniques with the focus on law enforcement forensic analysis. Spam filtering has been the major weapon against spam, but failed to reduce the number of spam emails sent to an indiscriminate set of recipients. The proposed algorithm accepts as input, spam mails of personal account and extracts features such...

2004
Simon Schlachter Roger Wattenhofer

Spamato is a collaborative spam filter system implemented in Java. It is designed as a framework to support any number and kind of spam filters. The initial version features an URL Filter, which extracts URLs from incoming mail messages and calculates a fingerprint based on these URLs. This fingerprint is compared to a central database. If its fingerprint is known as spam, the mail message is c...

2000
Sandeep Krishnamurthy

Spam Revisited ABSTRACT Even though unsolicited commercial e-mail or Spam continues to be a major problem, very little academic research has focused on it. Notable exceptions include The purpose of this paper is to provide a comprehensive overview of the Spam problem and a critical analysis of the solutions. We begin with a definition of Spam. This is followed by an analysis of the pernicious i...

Journal: :CoRR 2010
Dhinaharan Nagamalai Beatrice Cynthia Dhinakaran Jae-Kwang Lee

Spam messes up user’s inbox, consumes network resources and spread worms and viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is called blog spam or comment spam.It is done by posting comments or flooding spams to the services such as blogs, forums,news,email archives and guestbooks. Blog spams generally appears on guestbooks or comment pages where spammers fill a commen...

Journal: :CoRR 2015
Nour El Mawass Saad Alaboodi

Once an email problem, spam has nowadays branched into new territories with disruptive effects. In particular, spam has established itself over the recent years as a ubiquitous, annoying, and sometimes threatening aspect of online social networks. Due to its prevalent existence, many works have tackled spam on Twitter from different angles. Spam is, however, a moving target. The new generation ...

Journal: :JNW 2014
Yiping Zheng F. Liu

The development of telecom network and Internet provides effective ways for communication. As an important way in communication, Short Messaging Service (SMS) via both telecom network and Internet has played an increasing important role in daily life. However, it usually suffers from spam SMS that causes misunderstanding and cheat. The highly varying content, network environment make the identi...

2007
James Dudley Luigi Barone

IP Address blacklisting [1, 2] works by storing a list of the origin of known spam and then ignoring further email sent from that IP address, under the assumption it is also spam. This approach has two problems: spammers are able to circumvent it by regularly switching IP addresses, and after spam has been sent from an IP address hijacked by a spammer, email sent by the unsuspecting computer us...

2006
Chengyan Zhao

Spam identification is crucial in implementing an effective email filtering system, while spam recognization has different properties comparing with normal text recognization. In this paper, we present three different classifiers with detailed analysis on various training data set of the given spam database. We then combine these classifiers into a mixture of expert system which yields overall ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید