نتایج جستجو برای: spam mails

تعداد نتایج: 5032  

2004
ABST RACT

................................................................................................................................... I CHAPTER 1 BACKGROUND .................................................................................................... 2 BACKGROUND INFORMATION............................................................................................ 2 CONTEXT OF RESEARCH .....

Journal: :CoRR 2009
Srdjan Stankovic Dejan Simic

Botnets are networks of compromised computers with malicious code which are remotely controlled and which are used for starting distributed denial of service (DDoS) attacks, sending enormous number of e-mails (SPAM) and other sorts of attacks. Defense against modern Botnets is a real challenge. This paper offers several strategies for defense against Botnets with a list and description of measu...

2004
Dawid Weiss

I remember the time when I had no problem with spam. There simply was no spam at a bit of history that time. It was truly wonderful. Unfortunately, these happy times didn’t last too long—slowly but inevitably spammers got me. I now receive about 30–40 unwanted junk e-mails a day. And that’s, according to some individuals, not too many. Well, tell you what: when I reach the limit of, let’s say. ...

2017
Zahra Razi Seyyed Amir Asghari

he increasing use of e-mail in the world because of its simplicity and low cost, has led many Internet users are interested in developing their work in the context of the Internet. In the meantime, many of the natural or legal persons, to sending e-mails unrelated to mass. Hence, classification and identification of spam emails is very important. Many studies on spam indicate that it costs orga...

2017
Mallikka Rajalingam

Electronic mail is one of the important communication channels of information technology which serves across the globe. Though the functionalities of e-mail have been very helpful in serving both individuals and institutions, it encounters a major issue called ‘Spamming’. Spam mails are unwanted text or image-based messages, often sent without the consent of users so as to fill their mailboxes....

2006
José Ramon Méndez Florentino Fernández Riverola Fernando Díaz Eva Lorenzo Iglesias Juan M. Corchado

In this paper we analyse the strengths and weaknesses of the mainly used feature selection methods in text categorization when they are applied to the spam problem domain. Several experiments with different feature selection methods and content-based filtering techniques are carried out and discussed. Information Gain, χ-text, Mutual Information and Document Frequency feature selection methods ...

2003
Patrick Pantel Dekang Lin

We present a simple, yet highly accurate, spam filtering program, called SpamCop, which is able to identify about 92% of the spams while misclassifying only about 1.16% of the nonspam e-mails. SpamCop treats an e-mail message as a multiset of words and employs a na’fve Bayes algorithm to determine whether or not a message is likely to be a spam. Compared with keyword-spotting rules, the probabi...

Journal: :JIP 2014
Nariyoshi Yamai Masayuki Matsuoka Kiyohiko Okayama Keita Kawano Motonori Nakamura Masato Minda

Recently, many spam mails associated with “One-click fraud,” “Phishing,” and so on have been sent to unspecified large number of e-mail users. According to some previous works, most spam mails contained some URLs whose domains were registered relatively recently, such that the age of the domain used in the URL in the messages would be a good criterion for spam mail discrimination. However, it i...

2012
Mona Mohamed Zaki Ali David Diaz Babis Theodoulidis

This paper describes a service architecture for a financial market monitoring and surveillance system in which different components interact in coordination with internal and external service providers to produce proactive alarms for potential fraud cases. The proposed service system is demonstrated through an exemplar case study of text mining and data mining to analyze the impact of ‘stock-to...

2009
Jan Göbel Thorsten Holz Philipp Trinius

With increasing security measures in network services, remote exploitation is getting harder. As a result, attackers concentrate on more reliable attack vectors like email: victims are infected using either malicious attachments or links leading to malicious websites. Therefore efficient filtering and blocking methods for spam messages are needed. Unfortunately, most spam filtering solutions pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید