نتایج جستجو برای: visual memory spam counting spam

تعداد نتایج: 637246  

2017
Seongsoon Kim Seongwoon Lee Donghyeon Park Jaewoo Kang

Opinion spam, intentionally written by spammers who do not have actual experience with services or products, has recently become a factor that undermines the credibility of information online. In recent years, studies have attempted to detect opinion spam using machine learning algorithms. However, limitations of goldstandard spam datasets still prove to be a major obstacle in opinion spam rese...

2007
Karel Jezek Jiri Hynek

The paper presents a brief survey of the fight between spammers and antispam software developers, and also describes new approaches to spam filtering. In the first two sections we present a survey of the currently existing spam types. Some well-mapped spammer tricks are also described, although the imagination of spam distributors is endless, and therefore only the most common tricks are covere...

2006
Morton Swimmer Ian Whalley Barry Leiba Nathaniel S. Borenstein

The existance of networks of ‘bots’ raises the possibility of a new type of spam that breaks the current paradigm of spam defense, in which the defence acts purely as a filter. This spam, which we call parasitic spam, looks to a filter very much like spam with scraped text, but contains instead legitimate content going from a legitimate sender to a legitimate recipient. In this problem statemen...

Journal: :BMJ 2008

2006
Peter Nelson Kenneth Dallmeyer Lucasz Szybalski Tom Palarz Michael Wieher

The Spamalot system uses intelligent agents to interact with spam messages and systems referenced in spam. The goal of Spamalot is to consume spam senders’ resources by engaging the spammer in an unproductive conversation or information exchange. To date two Spamalot agents have been implemented: Arthur which handles Nigerian spam and Patsy which processes spam requesting information via web fo...

Journal: :Sistemi obrobki ìnformacìï 2021

Increased use of email in daily transactions for many businesses or general communication due to its cost-effectiveness has made emails vulnerable attacks, including spam. Spam are unsolicited messages that very similar each other and sent multiple recipients randomly. This study analyzes the Rotation Forest model modifies it spam classification problem. Also, aim this is create a better classi...

2014
Abu Awal Md Shoeb Dibya Mukhopadhyay Shahid Al Noor Alan Sprague Gary Warner

A substantial majority of the email sent everyday is spam. Spam emails cause many problems if someone acts or clicks on the link provided in the email body. The problems may include infecting users personal machine with malware, stealing personal information, capturing credit card information, etc. Since spam emails are generated as a part of a very limited numbers of spam campaigns, it is usef...

Journal: :Journal of Soft Computing Paradigm 2022

Recently, email has become a common way for people to communicate and share information both officially personally. Email may be used by spammers transmit harmful materials Internet users. The data must protected from unauthorized access, which necessitates the development of reliable method identifying spam emails. As result, variety solutions have been devised. An innovative hybrid machine le...

2012
M. SIVA KUMAR REDDY KRISHNA SAGAR

Today the major problem that the people are facing is spam mails or e-mail spam. In recent years there are so many schemes are developed to detect the spam emails. Here the primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed by user’s feedback, to block the subsequent near-duplicate spam’s. We propose a novel e-mail abstraction scheme, ...

Journal: :Perform. Eval. 2007
Luíz Henrique Gomes Cristiano Cazita Jussara M. Almeida Virgílio A. F. Almeida Wagner Meira

This article presents an extensive characterization of a spam-infected e-mail workload. The study aims at identifying and quantifying the characteristics that significantly distinguish spam from non-spam (i.e., legitimate) traffic, assessing the impact of spam on the aggregate traffic, providing data for creating synthetic workload models, and drawing insights into more effective spam detection...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید