نتایج جستجو برای: mobile spam

تعداد نتایج: 175069  

Journal: :Security and Communication Networks 2013
Elias Bou-Harb Makan Pourzandi Mourad Debbabi Chadi Assi

The 4G of mobile networks will be a technology-opportunistic and user-centric system, combining the economical and technological advantages of various transmission technologies. As a part of its new architecture, LTE networks will implement an evolved packet core. Although this will provide various critical advantages, it will, on the other hand, expose telecom networks to serious IP-based atta...

2009
Jose-Marcio Martins da Cruz Gordon V. Cormack

Email spam filters are commonly trained on a sample of recent spam and ham (non-spam) messages. We investigate the effect on filter performance of using samples of spam and ham messages sent months before those to be filtered. Our results show that filter performance deteriorates with the overall age of spam and ham samples, but at different rates. Spam and ham samples of different ages may be ...

2010
Fernando Sanchez Zhenhai Duan Yingfei Dong

It is well known that spammers can forge the header of an email, in particular, the trace information carried in the Received: fields, as an attempt to hide the true origin of the email. Despite its critical importance for spam control and holding accountable the true originators of spam, there has been no systematic study on the forgery behavior of spammers. In this paper, we provide the first...

2003
Terri Oda Tony White

Spam, the electronic equivalent of junk mail, affects over 600 million users worldwide. Even as anti-spam solutions change to limit the amount of spam sent to users, the senders adapt to make sure their messages are seen. This paper looks at application of the artificial immune system model to protect email users effectively from spam. In particular, it tests the spam immune system against the ...

Journal: :Computer Communications 2011
Zhenhai Duan Kartik Gopalan Xin Yuan

In this paper we present a detailed study of the behavioral characteristics of spammers based on a two-month email trace collected at a large US university campus network. We analyze the behavioral characteristics of spammers that are critical to spam control, including the distributions of message senders, spam and non-spam messages by spam ratios; the statistics of spam messages from differen...

Journal: :IJDCF 2009
Chengcui Zhang Xin Chen Wei-bang Chen Lin Yang Gary Warner

In this article, we propose a spam image clustering approach that uses data mining techniques to study the image attachments of spam emails with the goal to help the investigation of spam clusters or phishing groups. Spam images are first modeled based on their visual features. In particular, the foreground text layout, foreground picture illustrations and background textures are analyzed. Afte...

2016
Garima Jain

Email becomes the major source of communication these days. Most humans on the earth use email for their personal or professional use. Email is an effective, faster and cheaper way of communication. The importance and usage for the email is growing day by day. It provides a way to easily transfer information globally with the help of internet. Due to it the email spamming is increasing day by d...

2011
Congfu Xu Kevin Chiew Yafang Chen Juxin Liu

While enjoying the convenience of email communications, many users have also experienced annoying email spam. Even if the current spam detecting approaches have gained a competitive edge against text-based email spam, they still face the challenge arising from imagebased spam (image spam in short). Image spam normally includes embedded images that contain the spam messages in binary format rath...

2007
Wolfgang Narzt Gustav Pomberger Alois Ferscha Dieter Kolb Reiner Müller Horst Hörtner Ronald Haring

Emerging mobile location-based information services enable people to place digital content into the physical world. Based on three technical components (1) mobile devices, (2) wireless networking and (3) location-sensing the implementation of location-based services can be considered state of the art. In contrast, we observe a lack of conceptual work in terms of user interface issues, like desi...

Journal: :IEEE Access 2021

In this paper, we aim to explore the possibility of Transformer model in detecting spam Short Message Service (SMS) messages by proposing a modified that is designed for SMS messages. The evaluation our proposed performed on Spam Collection v.1 dataset and UtkMl's Twitter Detection Competition dataset, with benchmark multiple established machine learning classifiers state-of-the-art detection a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید