نتایج جستجو برای: financial spam

تعداد نتایج: 149510  

2006
Eilon Solan Eran Reshef

We provide a model to study the effects of three methods of fighting spam mail, namely (1) increasing the cost of mailing messages, (2) filters, and (3) a do-not-spam registry, on the number of spam messages that users receive, and on the efficiency of the internet (measured by the total number of spam messages spammers send).

Journal: :IJISP 2011
Archana Bhattarai Dipankar Dasgupta

This paper studies the problems and threats posed by a type of spam in the blogosphere, called blog comment spam. It explores the challenges introduced by comment spam, generalizing the analysis substantially to any other short text type spam. The authors analyze different high-level features of spam and legitimate comments based on the content of blog postings. The authors use these features t...

2012
Zi Chu Indra Widjaja Haining Wang

The popularity of Twitter greatly depends on the quality and integrity of contents contributed by users. Unfortunately, Twitter has attracted spammers to post spam content which pollutes the community. Social spamming is more successful than traditional methods such as email spamming by using social relationship between users. Detecting spam is the first and very critical step in the battle of ...

2010
Kathy J. Liszka Chandra Shekar

Microblogs are one of a growing group of social network tools. Twitter is, at present, one of the most popular forums for microblogging in online social networks, and the fastest growing. Fifty million messages flow through servers, computers, and cell phones on a wide variety of topics exchanged daily. With this considerable volume, Twitter is a natural and obvious target for spreading spam vi...

Journal: :CoRR 2012
Xinyu Xing Junho Ahn Wenke Lee Richard Han Shivakant Mishra

Recently, online video chat services are becoming increasingly popular. While experiencing tremendous growth, online video chat services have also become yet another spamming target. Unlike spam propagated via traditional medium like emails and social networks, we find that spam propagated via online video chat services is able to draw much larger attention from the users. We have conducted sev...

Journal: :Sub-stance 2021

This essay argues that amidst the superfluous clutter of spam is a credible ethos combining poetic consolation early modern sonneteer with indulgent excesses capitalist precariat. William Shakespeare’s Will sonnets (135 and 136) are explored as instances in they illustrate spam’s peculiar objective to deploy itself into fields lively but redundant engagement. While experimenting conventions son...

2011
N. T. Mohammad

Spam email, is the practice of frequently sending unwanted email messages, usually with commercial content, in large quantities to a set of indiscriminate email accounts. However, since spammers continuously improve their techniques in order to compromise the spam filters, building a spam filter that can be incrementally learned and adapted became an active research field. Researches employed m...

2015
Reena Sharma Gurjot Kaur

Internet has become an important part of our lives which is used for nearly all purposes. Internet is like an umbrella providing various services at a single time. One of the important uses of this is, sharing of information. E-mails are the most commonly used utility of internet for communication. The emails contain some unsolicited mails called spam which create the problems for users .Detect...

2014
Meghali Das Vijay Prasad

Researchers initially have addressed the problem of spam detection as a text classification or categorization problem. However, as spammers’ continue to develop new techniques and the type of email content becomes more disparate, text-based anti-spam approaches alone are not sufficiently enough in preventing spam. In an attempt to defeat the anti-spam development technologies, spammers have rec...

2009
Tyler Moore Richard Clayton

To implement a phishing scam, attackers must create a fake website and send spam to attract visitors. To date, empirical research into phishing’s impact has studied either the spam being sent or the website lifetimes. In this paper, we examine both phishing websites and the associated spam to gauge the overall effectiveness of phishing attack and defense. We find that while the bulk of spam is ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید