نتایج جستجو برای: email spam detection

تعداد نتایج: 656459  

Journal: :Journal of Advances in Computer Networks 2014

2005
Ching-Tung Wu Yuan-Fang Wang Matthew Turk Kwang-Ting Cheng

Embedded-Text Detection and Its Application to Anti-Spam Filtering Ching-Tung Wu Embedded-text in images usually carry important messages about the content. In the past, several algorithms have been proposed to detect text boxes in video frames. Previous work often followed a multi-step framework using a combination of image-analysis and machine-learning techniques. In this work, we propose a u...

2008
Bertrand Mathieu

I n general, “spam” describes information, often dubious in nature, sent to numerous recipients without their prior consent. Although the term typically refers to emails about hot stocks, revolutionary medicine, or adult content, spam can apply to all kinds of messages. Examples range from telemarketing calls and short message service texts to bulk mail and faxes. Since the first incident in th...

2010
Kathy J. Liszka Chandra Shekar

Microblogs are one of a growing group of social network tools. Twitter is, at present, one of the most popular forums for microblogging in online social networks, and the fastest growing. Fifty million messages flow through servers, computers, and cell phones on a wide variety of topics exchanged daily. With this considerable volume, Twitter is a natural and obvious target for spreading spam vi...

Journal: :Journal of Soft Computing Paradigm 2022

Recently, email has become a common way for people to communicate and share information both officially personally. Email may be used by spammers transmit harmful materials Internet users. The data must protected from unauthorized access, which necessitates the development of reliable method identifying spam emails. As result, variety solutions have been devised. An innovative hybrid machine le...

2017
Ahmed Hamza Osman Hani Moaiteq Aljahdali

This research proposed an improved filtering spam technique for suspected emails, messages based on feature weight and the combination of two-step clustering and logistic regression algorithm. Unique, important features are used as the optimum input for a hybrid proposed approach. This study adopted a spam detector model based on distance measure and threshold value. The aim of this model was t...

Journal: :IACR Cryptology ePrint Archive 2005
Amir Herzberg

Email's main (and initial) use is professional and personal communication. Email is very efficient, convenient and low-cost, especially when automatically sent by programs to many recipients ('bulk email'). Therefore, email is also used to distribute other messages: from unsolicited offerings and ads, to malicious content such as viruses and scams. Users are rarely interested in these messages;...

2004
Christopher P. Lueg

Proliferation of unrestricted Internet access has brought the community unsolicited commercial email, better known as spam. Underestimated for quite some time, spam is now recognized as a problem costing the community billions of dollars per annum. One of the direct impacts of the spam flood is the widespread deployment of anti-spam measures, such as email filters and block lists. In this paper...

2006
C. Jennings

Spam, defined as the transmission of bulk unsolicited messages, has plagued Internet email. Unfortunately, spam is not limited to email. It can affect any system that enables user to user communications. The Session Initiation Protocol (SIP) defines a system for user to user multimedia communications. Therefore, it is susceptible to spam, just as email is. In this document, we analyze the probl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید