نتایج جستجو برای: mobile spam

تعداد نتایج: 175069  

Journal: :Computers & Security 2010
Ji Won Yoon Hyoungshick Kim Jun Ho Huh

Spam messages are an increasing threat to mobile communication. Several mitigation techniques have been proposed, including white and black listing, challenge-response and content-based filtering. However, none are perfect and it makes sense to use a combination rather than just one. We propose an anti-spam framework based on the hybrid of contentbased filtering and challenge-response. A messag...

Journal: :International Journal of Electrical and Computer Engineering 2021

With the growth of mobile phones, short message service (SMS) became an essential text communication service. However, low cost and ease use SMS led to increase in Spam. In this paper, characteristics spam has studied a set features introduced get rid spam. addition, problem detection was addressed as clustering analysis that requires metaheuristic algorithm find structures. Three differential ...

Ali Hosseini Behrooz Azabdaftari Biook Behnam

The term ‘spam’ addresses unsolicited emails sent in bulk; therefore, the term‘financial fraud spam’ refers to unwanted bulk emails in which different tricks and techniques areemployed to swindle money from the recipients. Estimates show that more than 80% of worldwideemail traffic in 2011 was spam. It should be noted that while the number of daily spam emails in2002 was 2.4 billion, this numbe...

حضرتقلی زاده, رحیم, فتحیان, محمد,

In general, Spam is related to satisfy or not satisfy the client and isn’t related to the content of the client’s email. According to this definition, problems arise in the field of marketing and advertising for example, it is possible that some of the advertising emails become spam for some users, and not spam for others. To deal with this problem, many researchers design an anti-s...

Journal: :Journal of the Korea Academia-Industrial cooperation Society 2010

2007
Afra Jahanbakhsh Mashhadi Licia Capra

Social network analysis is the study of social relationships between individuals in a society. In recent years the increasing amount of interactions between individuals using mobile devices has motivated research in social network analysis of mobile networks. Portable devices, such as blackberries, mobile phones, personal digital assistants have gained wide popularity. They are increasingly bec...

Journal: :JCIT 2010
Geoffrey H. Tanakinjal Kenneth R. Deans Brendan J. Gray

Despite the increasing number of companies investing in mobile marketing campaigns, research investigation on the adoption process of mobile marketing from the perspective of consumers has been limited. Although mobile devices are a promising marketing tool, mobile spam (i.e. unsolicited SMS messages) raises privacy concerns relating to the utilisation of the personal and location data used to ...

2015
Mojtaba Alizadeh Mazdak Zamani Sabariah Baharun Azizah Abdul Manaf Kouichi Sakurai Hiroki Anada Hassan Keshavarz Shehzad Ashraf Chaudhry Muhammad Khurram Khan Kim-Kwang Raymond Choo

Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. Ho...

Journal: :International journal of emerging science and engineering 2023

Spam issues have become worse on social media platforms and apps with the growth of IoT. To solve problem, researchers suggested several spam detection techniques. rates are still high despite use anti-spam technologies tactics, especially given ubiquity rogue e-mails that lead to dangerous websites. By using up memory or storage space, may cause servers run slowly. One most essential methods f...

2002
Cheng Li Weinong Wang

The Simple Mail Transfer Protocol (SMTP) based E-mail system is the most popular application in today’s Internet world, but there are many dark clouds at the edge of the sunshiny sky. The most well known two threats are the “ mail SPAM” and the “ mail flooding attack .” Mobile agents (MAs) are software agents that can transport themselves from a client computer to various servers for remote exe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید