نتایج جستجو برای: financial spam

تعداد نتایج: 149510  

2013
Saber Salehi

Spam detection is a significant problem which is considered by many researchers by various developed strategies. The best and main spam detection technique should consider and scan the content of the messages to find spam. This research concerns the development of the certain category of granular computing as a classifier for spam detection. In this research, Fuzzy Granular Computing Classifica...

2007
Calton Pu

Automated Denial of Information Attacks. It is a common assumption in event processing that the events are “clean”, i.e., they come from well-behaved and trustworthy sources. This assumption does not hold in all major open communications media for several reasons. First, adversaries may spread massive noise data, e.g., in email spam. Second, adversaries may inject potentially interesting, but o...

Journal: :IJWIS 2009
Maria Soledad Pera Yiu-Kai Ng

Purpose The Web provides its users with abundant information. Unfortunately, when a Web search is performed, both users and search engines must deal with an annoying problem: the presence of spam documents that are ranked among legitimate ones. The mixed results downgrade the performance of search engines and frustrate users who are required to filter out useless information. To improve the qua...

2009
Marc Najork

Definition Web spam refers to a host of techniques to subvert the ranking algorithms of web search engines and cause them to rank search results higher than they would otherwise. Examples of such techniques include content spam (populating web pages with popular and often highly monetizable search terms), link spam (creating links to a page in order to increase its linkbased score), and cloakin...

2004
ABST RACT

................................................................................................................................... I CHAPTER 1 BACKGROUND .................................................................................................... 2 BACKGROUND INFORMATION............................................................................................ 2 CONTEXT OF RESEARCH .....

Journal: :JDFSL 2010
Chun Wei Alan Sprague Gary Warner Anthony Skjellum

Spam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the identification and disruption of the supporting infrastructure used by spammers is a more effective way of stopping spam than filtering. The termination of spam hosts will greatly reduce the profit a spammer can generate and thwart his ability to s...

2012
Raja Ramesh

With the increasing popularity of a E-mail users, E-mail spam problem growing proportionally. Spam filtering with near duplicate matching scheme is widely discussed in recent years. It is based on a known spam database formed by user feedback which cannot fully catch the evolving nature of spam and also it requires much storage. In view of above drawbacks, we proposed an effective spam detectio...

Journal: :JCP 2012
Qiu-yu Zhang Peng Wang Hui-juan Yang

The effect of spam filtering method based on statistics is not good enough in filtering the new-type spam with synonymous substitution and camouflage, because the method based on statistics ignores the semantic relation between words in the text, and only judges from the word itself. So, a method of spam filtering based on the semantic body is proposed in this paper. The method adopts lexical c...

2012
N. S. Kumar

Now-a-days, mailbox management has become a big task. A large proportion of the emails we receive are spam. These unwanted emails clog the inbox and are very ubiquitous. Here, a new technique for spam detection is presented that makes use of clustering and association rules generated by the Apriori algorithm. Vector space notation is used to represent the emails. The results obtained from exper...

2007
Battista Biggio Giorgio Fumera Ignazio Pillai Fabio Roli

We address the problem of filtering image spam, a rapidly spreading kind of spam in which the text message is embedded into attached images to defeat spam filtering techniques based on the analysis of e-mail’s body text. We propose an approach based on low-level image processing techniques to detect one of the main characterstics of most image spam, namely the use of content obscuring technique...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید