منابع مشابه
Observing Common Spam in Tweets and Email
Spam is pervasive across many types of electronic communication, including email, instant messaging, and social networks. To reach more users and increase financial gain, many spammers now use multiple content-sharing platforms— including online social networks—to disseminate spam. In this paper, we perform a joint analysis of spam in email and social networks. We use spam data from Yahoo’s web...
متن کاملEmail end users and spam: relations of gender and age group to attitudes and actions
As the problem of spam email increases, we examined users attitudes toward and experience with spam as a function of gender and age. College-age, working-age, and retirement-age men and women were surveyed. Most respondents strongly disliked receiving spam yet took few actions against it. There were fewer gender differences than predicted, but age was a significant predictor of several response...
متن کاملInexpensive Email Addresses An Email Spam-Combating System
This work proposes an effective method of fighting spam by developing Inexpensive Email Addresses (IEA), a stateless system of Disposable Email Addresses (DEAs). IEA can cryptographically generate exclusive email addresses for each sender, with the ability to re-establish a new email address once the old one is compromised. IEA accomplishes proof-of-work by integrating a challenge-response mech...
متن کاملIdentity Resolution in Email Collections
Title of dissertation: IDENTITY RESOLUTION IN EMAIL COLLECTIONS Tamer Mohamed Elsayed, Doctor of Philosophy, 2009 Dissertation directed by: Associate Professor Douglas W. Oard Department of Computer Science and College of Information Studies Access to historically significant email collections poses challenges that arise less often in personal collections. Most notably, people exploring a large...
متن کاملBoosting Trees for Anti-Spam Email Filtering
This paper describes a set of comparative experiments for the problem of automatically filtering unwanted electronic mail messages. Several variants of the AdaBoost algorithm with confidence– rated predictions (Schapire & Singer 99) have been applied, which differ in the complexity of the base learners considered. Two main conclusions can be drawn from our experiments: a) The boosting–based met...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Papeles del CEIC
سال: 2015
ISSN: 1695-6494
DOI: 10.1387/pceic.13194