نتایج جستجو برای: financial spam

تعداد نتایج: 149510  

2012
K. Srikanth

–While email is one of the fastest form of communication, the user is frequently faced with receiving unsolicited emails called spams. Nonspam mails are known as hams which are legitimate mails. It is practically very difficult to perfectly classify a mail into spam or ham basing on the content or subject of the mail. Several statistical methods are available which classify mails with some chan...

Journal: :International Journal of Computer Applications 2016

2015
Sneha Singh Sandeep Kaur

Spam is no more garbage but risk as it includes virus attachments and spyware agents which make the recipients’ system ruined, therefore, there is an emerging need for spam detection. Many spam detection techniques based on machine learning algorithms have been proposed. As the amount of spam has been increased tremendously using bulk mailing tools, spam detection techniques should deal with it...

2006
Flavio D. Garcia Jaap-Henk Hoepman Jeroen van Nieuwenhuizen

Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, have been proposed. In this paper we investigate the effectiveness of several spam filtering techniques and technologies. Our analysis was performed by simulating email traffic under different conditions. We show that ge...

2004
Flavio D. Garcia Jaap-Henk Hoepman Jeroen van Nieuwenhuizen

Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, have been proposed. In this paper we investigate the effectiveness of several spam filtering techniques and technologies. Our analysis was performed by simulating email traffic under different conditions. We show that ge...

2006
Daniel Povey

The Subspace Precision and Mean model (SPAM) is a way of representing Gaussian precision and mean values in a reduced dimension. This paper presents some large vocabulary experiments with SPAM and introduces an efficient way to optimize the SPAM basis. We present experiments comparing SPAM, diagonal covariance and full covariance models on a large vocabulary task. We also give explicit formulae...

Journal: :Human factors 2012
Russell S. Pierce

OBJECTIVE The objective of this study was to determine whether administration of the situation present assessment method (SPAM) affects workload and/or task performance. BACKGROUND SPAM probes are thought to isolate workload from the assessment of situation awareness (SA) by including a warning signal before asking an SA-related question. However, there is a good reason to think that SPAM may...

2010
Pedro H. Calais Guerra Dorgival Guedes Wagner Meira Cristine Hoepers Marcelo H. P. C. Chaves Klaus Steding-Jessen

Current studies on spam evolution usually extract evolution patterns and trends by analyzing historical spam message corpora. In this paper, we propose a novel methodology that incorporates spam filters to the spam trend analysis, as they are the agents that may force spammers to change their tactics. Moreover, filters also evolve over time and different filter releases present different charac...

2018
Joyce Jiyoung Whang Yeon Seong Jeong Inderjit S. Dhillon Seonggoo Kang Jungmin Lee

Web spam detection is an important problem in Web search. Since Web spam pages tend to have a lot of spurious links, many Web spam detection algorithms exploit the hyperlink structure between the Web pages to detect the spam pages. Anti-TrustRank algorithm is a well-known link-based spam detection algorithm which follows the principle that spam pages are likely to be referenced by other spam pa...

2010
Emma Scanlan

The fight to curb the ever-increasing amount of unsolicited commercial email or “spam” showing up in the inboxes of American businesses has generated both state and federal legislation. The CAN-SPAM Act of 2003 was enacted to create a bright-line between spam and legal commercial email. The Act preempted many state spam laws but also left significant enforcement abilities to the individual stat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید