نتایج جستجو برای: visual memory spam counting spam
تعداد نتایج: 637246 فیلتر نتایج به سال:
Opinion spam, intentionally written by spammers who do not have actual experience with services or products, has recently become a factor that undermines the credibility of information online. In recent years, studies have attempted to detect opinion spam using machine learning algorithms. However, limitations of goldstandard spam datasets still prove to be a major obstacle in opinion spam rese...
The paper presents a brief survey of the fight between spammers and antispam software developers, and also describes new approaches to spam filtering. In the first two sections we present a survey of the currently existing spam types. Some well-mapped spammer tricks are also described, although the imagination of spam distributors is endless, and therefore only the most common tricks are covere...
The existance of networks of ‘bots’ raises the possibility of a new type of spam that breaks the current paradigm of spam defense, in which the defence acts purely as a filter. This spam, which we call parasitic spam, looks to a filter very much like spam with scraped text, but contains instead legitimate content going from a legitimate sender to a legitimate recipient. In this problem statemen...
The Spamalot system uses intelligent agents to interact with spam messages and systems referenced in spam. The goal of Spamalot is to consume spam senders’ resources by engaging the spammer in an unproductive conversation or information exchange. To date two Spamalot agents have been implemented: Arthur which handles Nigerian spam and Patsy which processes spam requesting information via web fo...
Increased use of email in daily transactions for many businesses or general communication due to its cost-effectiveness has made emails vulnerable attacks, including spam. Spam are unsolicited messages that very similar each other and sent multiple recipients randomly. This study analyzes the Rotation Forest model modifies it spam classification problem. Also, aim this is create a better classi...
A substantial majority of the email sent everyday is spam. Spam emails cause many problems if someone acts or clicks on the link provided in the email body. The problems may include infecting users personal machine with malware, stealing personal information, capturing credit card information, etc. Since spam emails are generated as a part of a very limited numbers of spam campaigns, it is usef...
Recently, email has become a common way for people to communicate and share information both officially personally. Email may be used by spammers transmit harmful materials Internet users. The data must protected from unauthorized access, which necessitates the development of reliable method identifying spam emails. As result, variety solutions have been devised. An innovative hybrid machine le...
Today the major problem that the people are facing is spam mails or e-mail spam. In recent years there are so many schemes are developed to detect the spam emails. Here the primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed by user’s feedback, to block the subsequent near-duplicate spam’s. We propose a novel e-mail abstraction scheme, ...
This article presents an extensive characterization of a spam-infected e-mail workload. The study aims at identifying and quantifying the characteristics that significantly distinguish spam from non-spam (i.e., legitimate) traffic, assessing the impact of spam on the aggregate traffic, providing data for creating synthetic workload models, and drawing insights into more effective spam detection...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید