نتایج جستجو برای: mobile spam
تعداد نتایج: 175069 فیلتر نتایج به سال:
The explosive growth of user data on the Internet has introduced significant security threats. In recent years, large data breaches and malicious content distribution (spam, malware) become prevalent. With the rapid adoption of mobile and wearable devices, user data now includes a wide range of personal mobile and physical data. It ranges from GPS location traces, to biometrics data, to user in...
Since more networking technologies and communication channels have been developed, Internet users have moved their roles from being strictly information consumers to both information consumers and producers. Moreover, users on nets might also be intermediaries, inter-actors, interferences or message providers, even service providers. Information on the Internet is dramatically growing. On one h...
The explosive growth of user data on the Internet has introduced significant security threats. In recent years, large data breaches and malicious content distribution (spam, malware) become prevalent. With the rapid adoption of mobile and wearable devices, user data now includes a wide range of personal mobile and physical data. It ranges from GPS location traces, to biometrics data, to user in...
The explosive growth of user data on the Internet has introduced significant security threats. In recent years, large data breaches and malicious content distribution (spam, malware) become prevalent. With the rapid adoption of mobile and wearable devices, user data now includes a wide range of personal mobile and physical data. It ranges from GPS location traces, to biometrics data, to user in...
Text analysis includes lexical analysis of the text and has been widely studied and used in diverse applications. In the last decade, researchers have proposed many efficient solutions to analyze / classify large text dataset, however, analysis / classification of short text is still a challenge because 1) the data is very sparse 2) It contains noise words and 3) It is difficult to understand t...
Network security provides the network with the authorization of access to data in a network, which is prohibited by the network administrator. Proxy Mobile IPv6 (PMIPv6) supports mobility management without the participation of mobile nodes it support mobility management in any mobility-related signaling. In comparison with other existing methods, PMIPv6 has decreased signaling overhead and the...
I n general, “spam” describes information, often dubious in nature, sent to numerous recipients without their prior consent. Although the term typically refers to emails about hot stocks, revolutionary medicine, or adult content, spam can apply to all kinds of messages. Examples range from telemarketing calls and short message service texts to bulk mail and faxes. Since the first incident in th...
there are strong relationship and common neural mechanism between working memory, short term storage, executive attention and fluid intelligence. therefore we can consider these constructs as integrated construct as fluid cognition. to verify this claim, we implemented forward and backward digit and letter spam, visual memory spam. counting spam, stroop, wisconsin card, keep track and cattle i...
In this paper we describe a network for distributing personalised information with the usage of artificial intelligence methods. Reception of this information should be possible with everyday mobile equipment. Intelligent filtering and spam protection aim at integrating this technology into our environment. Information on the system architecture and usage of the installation are also presented.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید