نتایج جستجو برای: financial spam

تعداد نتایج: 149510  

Journal: :IT Professional 2016
Chao Chen Jun Zhang Yang Xiang Wanlei Zhou Jonathan Oliver

T witter has become one of the most commonly used communication tools in daily life. With 500 million users, Twitter now generates more than 500 million tweets per day. However, its popularity has also attracted spamming. Spammers spread many intensive tweets, which can lure legitimate users to commercial or malicious sites containing malware downloads, phishing, drug sales, scams, and more.1 S...

2009
Jeongkyu Shin Seunghwan Kim

Spam filtering is one of the most challenging problems in electric message systems. In general, recent studies on specifying real spam source are based on content filtering because spammers usually falsify their origin. We propose a method to specify spam source based on structural analysis with complex network. We assume that each spam sources either has the same victim list or uses the same s...

2006
Carl J. Case Darwin L. King

During the past few years, spam has invaded electronic mail boxes and become one of the major challenges for information systems (IS) professionals. Spam decreases user productivity, erodes electronic mail reliability, and requires the maintenance of spam-filtering software that drains the IS budget. Although spam is the largest type of electronic mail received, spam levels have begun to decrea...

2004
Geoff Hulten Anthony Penta Gopalakrishnan Seshadrinathan Manav Mishra

Introduction In this paper we analyze a very large junk e-mail corpus which was generated by a hundred thousand volunteer users of the Hotmail e-mail service. We describe how the corpus is being collected and then discuss how both the products being advertised by spam and the specific exploits being used to avoid spam filters have changed over time. Every day we randomly select one message from...

Journal: :J. Network and Computer Applications 2008
Eleni Georgiou Marios D. Dikaiakos Athena Stassopoulou

The main purpose of most spam e-mail messages distributed on Internet today is to entice recipients into visiting World Wide Web pages that are advertised through spam. In essence, e-mail spamming is a campaign that advertises URL addresses at a massive scale and at minimum cost for the advertisers and those advertised. Nevertheless, the characteristics of URL addresses and of web sites adverti...

2009
Jan Göbel Thorsten Holz Philipp Trinius

With increasing security measures in network services, remote exploitation is getting harder. As a result, attackers concentrate on more reliable attack vectors like email: victims are infected using either malicious attachments or links leading to malicious websites. Therefore efficient filtering and blocking methods for spam messages are needed. Unfortunately, most spam filtering solutions pr...

Journal: :PLoS Medicine 2007
Peter Gernburd Alejandro R Jadad

S pam, the term used to describe unsolicited e-mail received from an unknown sender without expressed consent of the recipient [1], has become a major problem for communications through the Internet. Since the delivery of the fi rst spam message in 1978 [2], the volume of spam has grown tremendously. In January 2005, the percentage of all e-mails, worldwide, identifi ed as spam was estimated at...

2004
Minh Tran Grenville Armitage

This paper examines an approach to spam mitigation that rate limits incoming TCP/IP connections to an SMTP server based on the real-time detection of spam within the SMTP message exchange. Our approach is motivated by a desire to cause increased resource consumption at the spammer end of each SMTP connection, and to avoid the negative impact of falsepositives by eventually allowing all emails t...

2010
Pang-Ning Tan Feilong Chen Anil K Jain

As online social media applications continue to gain its popularity, concerns about the rapid proliferation of Web spam has grown in recent years. These applications allow spammers to submit links anonymously, diverting unsuspected users to spam Web sites. This paper presents a novel co-classification framework to simultaneously detect Web spam and spammers in social media Web sites based on th...

2003
Marco Paganini

We present Active Spam Killer (ASK), a program that attempts to validate unknown senders before allowing delivery of their message. Validation occurs by means of a challenge reply sent to senders who are not yet known to the system. Messages are kept in a queue pending confirmation until the sender replies to the challenge. Further messages coming from confirmed senders are delivered immediatel...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید