نتایج جستجو برای: financial spam
تعداد نتایج: 149510 فیلتر نتایج به سال:
In recent years, there has been considerable interest among people to use short message service (SMS) as one of the essential and straightforward communications services on mobile devices. The increased popularity of this service also increased the number of mobile devices attacks such as SMS spam messages. SMS spam messages constitute a real problem to mobile subscribers; this worries telecomm...
The growth in the utilization of text mining tools and techniques in the last decade has been primarily driven by the increase in the sheer volume of unstructured texts and the need to extract useful and more importantly, quality information from them. The impetus to analyse unstructured data efficiently and effectively as part of the decision making processes within an organization has further...
The growth in the utilization of text mining tools and techniques in the last decade has been primarily driven by the increase in the sheer volume of unstructured texts and the need to extract useful and more importantly, quality information from them. The impetus to analyse unstructured data efficiently and effectively as part of the decision making processes within an organization has further...
1 ME Computer Student, 2 Professor 1,2 Computer Department, Pimpri Chinchwad College of Engineering, Nigdi, Pune, Maharashtra, INDIA _________________________________________________________________________ Abstract: Email spam or junk e-mail is one of the major problems of the today's usage of Internet, which carries financial damage to organizations and annoying individual users. Among the ap...
We offer a microeconomic model of the market for bulk commercial advertising email (the dominant form of spam). We adopt an incentive-centered design approach to develop a simple, feasible improvement to the current email system: an uncensored communication channel. Such a channel could be an email folder or account, to which properly tagged commercial solicitations are routed. We characterize ...
This paper describes a service architecture for a financial market monitoring and surveillance system in which different components interact in coordination with internal and external service providers to produce proactive alarms for potential fraud cases. The proposed service system is demonstrated through an exemplar case study of text mining and data mining to analyze the impact of ‘stock-to...
Emails are one of the fastest economic communications. Increasing email users has caused the increase of spam in recent years. As we know, spam not only damages user’s profits, time-consuming and bandwidth, but also has become as a risk to efficiency, reliability, and security of a network. Spam developers are always trying to find ways to escape the existing filters therefore new filters to de...
Spam messes up users inbox, consumes resources and spread attacks like DDoS, MiM, phishing etc. Phishing is a byproduct of email and causes financial loss to users and loss of reputation to financial institutions. In this paper we examine the characteristics of phishing and technology used by Phishers. In order to counter anti-phishing technology, phishers change their mode of operation; theref...
............................................................................................................................. 3 INTRODUCTION: ..................................................................................................................... 3 PART ONE: THE PROGRESS OF SPAM ...................................................................................... 4 PART TWO: DEFIN...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید