نتایج جستجو برای: mobile spam
تعداد نتایج: 175069 فیلتر نتایج به سال:
Spam messages are an increasing threat to mobile communication. Several mitigation techniques have been proposed, including white and black listing, challenge-response and content-based filtering. However, none are perfect and it makes sense to use a combination rather than just one. We propose an anti-spam framework based on the hybrid of contentbased filtering and challenge-response. A messag...
With the growth of mobile phones, short message service (SMS) became an essential text communication service. However, low cost and ease use SMS led to increase in Spam. In this paper, characteristics spam has studied a set features introduced get rid spam. addition, problem detection was addressed as clustering analysis that requires metaheuristic algorithm find structures. Three differential ...
The term ‘spam’ addresses unsolicited emails sent in bulk; therefore, the term‘financial fraud spam’ refers to unwanted bulk emails in which different tricks and techniques areemployed to swindle money from the recipients. Estimates show that more than 80% of worldwideemail traffic in 2011 was spam. It should be noted that while the number of daily spam emails in2002 was 2.4 billion, this numbe...
In general, Spam is related to satisfy or not satisfy the client and isn’t related to the content of the client’s email. According to this definition, problems arise in the field of marketing and advertising for example, it is possible that some of the advertising emails become spam for some users, and not spam for others. To deal with this problem, many researchers design an anti-s...
Social network analysis is the study of social relationships between individuals in a society. In recent years the increasing amount of interactions between individuals using mobile devices has motivated research in social network analysis of mobile networks. Portable devices, such as blackberries, mobile phones, personal digital assistants have gained wide popularity. They are increasingly bec...
Despite the increasing number of companies investing in mobile marketing campaigns, research investigation on the adoption process of mobile marketing from the perspective of consumers has been limited. Although mobile devices are a promising marketing tool, mobile spam (i.e. unsolicited SMS messages) raises privacy concerns relating to the utilisation of the personal and location data used to ...
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. Ho...
Spam issues have become worse on social media platforms and apps with the growth of IoT. To solve problem, researchers suggested several spam detection techniques. rates are still high despite use anti-spam technologies tactics, especially given ubiquity rogue e-mails that lead to dangerous websites. By using up memory or storage space, may cause servers run slowly. One most essential methods f...
The Simple Mail Transfer Protocol (SMTP) based E-mail system is the most popular application in today’s Internet world, but there are many dark clouds at the edge of the sunshiny sky. The most well known two threats are the “ mail SPAM” and the “ mail flooding attack .” Mobile agents (MAs) are software agents that can transport themselves from a client computer to various servers for remote exe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید