To see the other types of publications on this topic, follow the link: Spam-Mail.

Dissertations / Theses on the topic 'Spam-Mail'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Spam-Mail.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Hassan, Tarek. "Towards eradication of SPAM: A study on intelligent adaptive SPAM filters." Thesis, Hassan, Tarek (2006) Towards eradication of SPAM: A study on intelligent adaptive SPAM filters. Masters by Research thesis, Murdoch University, 2006. https://researchrepository.murdoch.edu.au/id/eprint/67/.

Full text
Abstract:
As the massive increase of electronic mail (email) usage continues, SPAM (unsolicited bulk email), has continued to grow because it is a very inexpensive method of advertising. These unwanted emails can cause a serious problem by filling up the email inbox and thereby leaving no space for legitimate emails to pass through. Currently the only defense against SPAM is the use of SPAM filters. A novel SPAM filter GetEmail5 along with the design rationale, is described in this thesis. To test the efficacy of GetEmail5 SPAM filter, an experimental setup was created and a commercial bulk email program was used to send SPAM and non-SPAM emails to test the new SPAM filter. GetEmail5's efficiency and ability to detect SPAM was compared against two highly ranked commercial SPAM filters on different sets of emails, these included all SPAM, non-SPAM, and mixed emails, also text and HTML emails. The results showed the superiority of GetEmail5 compared to the two commercial SPAM filters in detecting SPAM emails and reducing the user's involvement in categorizing the incoming emails. This thesis demonstrates the design rationale for GetEmail5 and also its greater effectiveness in comparison with the commercial SPAM filters tested.
APA, Harvard, Vancouver, ISO, and other styles
2

Hassan, Tarek. "Towards eradication of SPAM : a study on intelligent adaptive SPAM filters /." Hassan, Tarek (2006) Towards eradication of SPAM: a study on intelligent adaptive SPAM filters. Masters by Research thesis, Murdoch University, 2006. http://researchrepository.murdoch.edu.au/67/.

Full text
Abstract:
As the massive increase of electronic mail (email) usage continues, SPAM (unsolicited bulk email), has continued to grow because it is a very inexpensive method of advertising. These unwanted emails can cause a serious problem by filling up the email inbox and thereby leaving no space for legitimate emails to pass through. Currently the only defense against SPAM is the use of SPAM filters. A novel SPAM filter GetEmail5 along with the design rationale, is described in this thesis. To test the efficacy of GetEmail5 SPAM filter, an experimental setup was created and a commercial bulk email program was used to send SPAM and non-SPAM emails to test the new SPAM filter. GetEmail5's efficiency and ability to detect SPAM was compared against two highly ranked commercial SPAM filters on different sets of emails, these included all SPAM, non-SPAM, and mixed emails, also text and HTML emails. The results showed the superiority of GetEmail5 compared to the two commercial SPAM filters in detecting SPAM emails and reducing the user's involvement in categorizing the incoming emails. This thesis demonstrates the design rationale for GetEmail5 and also its greater effectiveness in comparison with the commercial SPAM filters tested.
APA, Harvard, Vancouver, ISO, and other styles
3

Wagner, Alexander. "Unerwünschte E-Mail-Werbung /." Wien : WUV-Univ.-Verl, 2003. http://www.gbv.de/dms/zbw/366320793.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cheung, Pak-to Patrick. "A study on combating the problem of unsolicited electronic messages in Hong Kong." Click to view the E-thesis via HKUTO, 2007. http://sunzi.lib.hku.hk/hkuto/record/B38608248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tobler, Simon P. "Exploring decentralized collaborative filtering against spam mail." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Department of Computer Science, Institute of Pervasive Computing, Information and Communication Systems Research Group, 2008. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Richter, Frank. "Neue Anti-Spam-Techniken." Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400379.

Full text
Abstract:
Workshop "Netz- und Service-Infrastrukturen" Dieser Beitrag zum Workshop "Netz- und Service-Infrastrukturen" 2004 analysiert den Stand der Anti-Spam-Maßnahmen an der TU Chemnitz und zeigt neue Techniken auf.
APA, Harvard, Vancouver, ISO, and other styles
7

Eggendorfer, Tobias. "Methoden der Spambekämpfung und -vermeidung /." Norderstedt : Books on Demand, 2007. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=016357555&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ramachandran, Anirudh Vadakkedath. "Mitigating spam using network-level features." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41068.

Full text
Abstract:
Spam is an increasing menace in email: 90% of email is spam, and over 90% of spam is sent by botnets---networks of compromised computers under the control of miscreants. In this dissertation, we introduce email spam filtering using network-level features of spammers. Network-level features are based on lightweight measurements that can be made in the network, often without processing or storing a message. These features stay relevant for longer periods, are harder for criminals to alter at will (e.g., a bot cannot act independently of other bots in the botnet), and afford the unique opportunity to observe the coordinated behavior of spammers. We find that widely-used IP address-based reputation systems (e.g., IP blacklists) cannot keep up with the threats of spam from previously unseen IP addresses, and from new and stealthy attacks---to thwart IP-based reputation systems, spammers are reconnoitering IP Blacklists and sending spam from hijacked IP address space. Finally, spammers are "gaming" collaborative filtering by users in Web-based email by casting fraudulent "Not Spam" votes on spam email. We present three systems that detect each attack that uses spammer behavior rather than their IP address. First, we present IP blacklist counter-intelligence, a system that can passively enumerate spammers performing IP blacklist reconnaissance. Second, we present SpamTracker, a system that distinguishes spammers from legitimate senders by applying clustering on the set of domains to which email is sent. Third, we analyze vote-gaming attacks in large Web-based email systems that pollutes user feedback on spam emails, and present an efficient clustering-based method to mitigate such attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Husna, Husain Dantu Ram. "Models to combat email spam botnets and unwanted phone calls." [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-6095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Frank, Thomas. "Zur strafrechtlichen Bewältigung des Spamming /." Berlin : Logos-Verl, 2004. http://www.gbv.de/dms/spk/sbb/recht/toc/379099837.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Richter, Frank. ""Die guten ins Töpfchen, die schlechten ins ..." - Filter für E-Mail." Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100300.

Full text
Abstract:
Gemeinsamer Workshop von Universitaetsrechenzentrum und Professur "Rechnernetze und verteilte Systeme" der Fakultaet fuer Informatik der TU Chemnitz. Workshop-Thema: Mobilitaet Es werden Filtermöglichkeiten für E-Mails vorgestellt, um die E-Mail-Bearbeitung zu automatisieren und Spam-Mails und Mails mit gefährlichem Inhalt abzuwehren.
APA, Harvard, Vancouver, ISO, and other styles
12

Husna, Husain. "Models to Combat Email Spam Botnets and Unwanted Phone Calls." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc6095/.

Full text
Abstract:
With the amount of email spam received these days it is hard to imagine that spammers act individually. Nowadays, most of the spam emails have been sent from a collection of compromised machines controlled by some spammers. These compromised computers are often called bots, using which the spammers can send massive volume of spam within a short period of time. The motivation of this work is to understand and analyze the behavior of spammers through a large collection of spam mails. My research examined a the data set collected over a 2.5-year period and developed an algorithm which would give the botnet features and then classify them into various groups. Principal component analysis was used to study the association patterns of group of spammers and the individual behavior of a spammer in a given domain. This is based on the features which capture maximum variance of information we have clustered. Presence information is a growing tool towards more efficient communication and providing new services and features within a business setting and much more. The main contribution in my thesis is to propose the willingness estimator that can estimate the callee's willingness without his/her involvement, the model estimates willingness level based on call history. Finally, the accuracy of the proposed willingness estimator is validated with the actual call logs.
APA, Harvard, Vancouver, ISO, and other styles
13

Moustakas, Evangelos. "Unsolicited commercial e-mail (spam) : integrated policy and practice." Thesis, Middlesex University, 2007. http://eprints.mdx.ac.uk/13599/.

Full text
Abstract:
The internet offers a cost-effective medium to build better relationships with customers than has been possible with traditional marketing media. Internet technologies, such as electronic mail, web sites and digital media, offer companies the ability to expand their customer reach, to target specific communities, and to communicate and interact with customers in a highly customised manner. In the last few years, electronic mail has emerged as an important marketing tool to build and maintain closer relationships both with customers and with prospects. E-mail marketing has become a popular choice for companies as it greatly reduces the costs associated with previously conventional methods such as direct mailing, cataloguing (i.e. sending product catalogues to potential customers) and telecommunication marketing. As small consumers obtain e-mail addresses, the efficiency of using e-mail as a marketing tool will grow. While e-mail may be a boon for advertisers, it is a problem for consumers, corporations and internet service providers since it is used for sending 'spam' (junk-mail). Unsolicited commercial e-mail (UCE), which is commonly called spam, impinges on the privacy of individual internet users. It can also cost users in terms of the time spent reading and deleting the messages, as well as in a direct financial sense where users pay time-based connection fees. Spam, which most frequently takes the form of mass mailing advertisements, is a violation of internet etiquette (EEMA, 2002). This thesis shows that spam is an increasing problem for information society citizens. For the senders of spam, getting the message to millions of people is easy and cost-effective, but for the receivers the cost of receiving spam is financial, time-consuming, resource-consuming, possibly offensive or even illegal, and also dangerous for information systems. The problem is recognised by governments who have attempted legislative measures, but these have had little impact because of the combined difficulties of crossing territorial boundaries and of continuously evasive originating addresses. Software developers are attempting to use technology to tackle the problem, but spammers keep one step ahead, for example by adapting subject headings to avoid filters. Filters have difficulty differentiating between legitimate e-mail and unwanted e-mail, so that while we may reduce our junk we may also reduce our wanted messages. Putting filter control into the hands of individual users results in an unfair burden, in that there is a cost of time and expertise from the user. Where filter control is outsourced to expert third parties, solving the time and expertise problems, the cost becomes financial. Given the inadequacy of legislation, and the unreliability of technical applications to resolve the problem, there is an unfair burden on information society citizens. This research has resulted in the conclusion that cooperation between legislation and technology is the most effective way to handle and manage spam, and that therefore a defence in depth should be based on a combination of those two strategies. The thesis reviews and critiques attempts at legislation, self-regulation and technical solutions. It presents a case for an integrated and user-oriented approach, and provides recommendations.
APA, Harvard, Vancouver, ISO, and other styles
14

Frobese, Dirk T. "E-Mail-Kategorisierung und Spam-Detektion mit SENTRAX [Mustererkennung mit Assoziativmatrizen]." Hildesheim Berlin Franzbecker, 2009. http://d-nb.info/999598341/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Sontag, Ralph. "Bayes kontra Spam." Universitätsbibliothek Chemnitz, 2003. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200300827.

Full text
Abstract:
Workshop Mensch-Computer-Vernetzung Derzeitige Spam-Erkennung weist eklatante Mängel auf. Die Zunahme des Spam-Aufkommens erfordet neue Ansätze, um der Plage Herr zu werden. Der Vortrag erläutert, wie mit Hilfe des Satzes von Bayes die Spam-Erkennung deutlich verbessert werden kann.
APA, Harvard, Vancouver, ISO, and other styles
16

Palla, Srikanth. "A Multi-Variate Analysis of SMTP Paths and Relays to Restrict Spam and Phishing Attacks in Emails." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5402/.

Full text
Abstract:
The classifier discussed in this thesis considers the path traversed by an email (instead of its content) and reputation of the relays, features inaccessible to spammers. Groups of spammers and individual behaviors of a spammer in a given domain were analyzed to yield association patterns, which were then used to identify similar spammers. Unsolicited and phishing emails were successfully isolated from legitimate emails, using analysis results. Spammers and phishers are also categorized into serial spammers/phishers, recent spammers/phishers, prospective spammers/phishers, and suspects. Legitimate emails and trusted domains are classified into socially close (family members, friends), socially distinct (strangers etc), and opt-outs (resolved false positives and false negatives). Overall this classifier resulted in far less false positives when compared to current filters like SpamAssassin, achieving a 98.65% precision, which is well comparable to the precisions achieved by SPF, DNSRBL blacklists.
APA, Harvard, Vancouver, ISO, and other styles
17

Mansmann, Florian. "Visuelle Analyse von E-mail-Verkehr." [S.l. : s.n.], 2003. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10806373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Kaushik, Saket. "Policy-controlled email services." Fairfax, VA : George Mason University, 2007. http://hdl.handle.net/1920/2937.

Full text
Abstract:
Thesis (Ph. D.)--George Mason University, 2007.<br>Title from PDF t.p. (viewed Jan. 18, 2008). Thesis directors: Paul Amman, Duminda Wijesekera. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Vita: p. 198. Includes bibliographical references (p. 189-197). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
19

Cheung, Pak-to Patrick, and 張伯陶. "A study on combating the problem of unsolicited electronic messages inHong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B38608248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Oeltjebruns, Michael. "Direktmarketing im Internet und die Spam-Problematik : Voraussetzungen, Entwicklungen, Lösungsansätze /." Saarbrücken : VDM, Müller, 2003. http://deposit.d-nb.de/cgi-bin/dokserv?id=2860721&prov=M&dok_var=1&dok_ext=htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Nussbaum, Ronald. "Graph-based email prioritization." Diss., Connect to online resource - MSU authorized users, 2008.

Find full text
Abstract:
Thesis (M.S.)--Michigan State University. Computer Science and Engineering, 2008.<br>Title from PDF t.p. (viewed on July 29, 2009) Includes bibliographical references (p. 45-47). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
22

Peters, Thomas. "Die Entwicklung der E-Mail-Werbung unter besonderer Berücksichtigung der UWG-Reform /." Berlin : Wvb, Wiss. Verl, 2006. http://www.wvberlin.de/data/inhalt/peters.htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lohr, Frank. "TRIPOLI - Empowered Email Environment." Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400407.

Full text
Abstract:
Workshop "Netz- und Service-Infrastrukturen" Der Vortrag im Rahmen des Workshop "Netz- und Service-Infrastrukturen" stellt das Projekt Tripoli vor, zeigt Ziele und Prinzipien der erweiterten Emailumgebung (Empowered Email Environment, Tripple-E) für authentifizierten und zertifizierten Emailverkehr, Ablauf der Kommunikation und zu lösende Probleme auf.
APA, Harvard, Vancouver, ISO, and other styles
24

Šebek, Michal. "Principy používané u e-mailových antispamových ochran." Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-2839.

Full text
Abstract:
Diplomová práce se zabývá nevyžádanými e-mailovými dopisy neboli spamem. V práci jsou popsány základy komunikace využívané u elektronické pošty a de?nice spamu. V práci jsou shrnuty druhy spamů a možnosti, jak se nevyžádaným zpravám bránit, a to jak na straně odesílatele, tak na straně příjemce. Naznačeny jsou také postupy, jakými lze tyto obrany obejít. V praktické části je pak ukázáno, jak lze postupy pro obelstění antispamových ?ltrů využít.
APA, Harvard, Vancouver, ISO, and other styles
25

Worley, Jerry A. "E-mail spam filtering solution for the Western Interstate Commission for Higher Education (WICHE)." [Denver, Colo.] : Regis University, 2005. http://165.236.235.140/lib/JWorley2005.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Richter, Frank, and Ralph Sontag. "E-Mail für Dich - Lust oder Frust?" Universitätsbibliothek Chemnitz, 2003. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200300591.

Full text
Abstract:
Genervte Nutzer, verunsicherte Admins, panische Mailserver: Die täglich zu Tausenden eintreffenden unerwünschten Mails - Spam - gefährden die Mailinfrastruktur.Der Vortrag wird Vor- und Nachsorgemöglichkeiten für geplagte Nutzer und Administratoren erläutern. Techniken der Spamerkennung werden vorgestellt.
APA, Harvard, Vancouver, ISO, and other styles
27

Sroufe, Paul Dantu Ram. "E-shape analysis." [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/ark:/67531/metadc12201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Lam, Ho-Yu. "A learning approach to spam detection based on social networks /." View abstract or full-text, 2007. http://library.ust.hk/cgi/db/thesis.pl?CSED%202007%20LAM.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Möller, Manuel. "Spamerkennung mit Support Vector Machines." [S.l. : s.n.], 2005. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB12046020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Wenerstrom, Brent. "Temporal data mining in a dynamic feature space /." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1317.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Qvist, Olof, and Julia Berggren. "Viral Marketing : How does the individual view a viral marketing message and what makes him or her pass it along?" Thesis, University of Gävle, Department of Business Administration and Economics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-672.

Full text
Abstract:
<p>Viral marketing is a form of marketing that is based on individuals sharing of a message within their social network. When viral marketing works, it’s cheap and efficient and there are several examples of successful viral marketing campaigns that has given products or companies great success.</p><p>Viral marketing is relatively unexplored as a phenomenon, and there are several different suggested paths to choose to form a successful campaign. One suggestion is that viral marketers base their campaigns on different feelings to make the individual share the campaign, or feeling, with its social network. This is one of the things that we are looking at in this report. With a quantitative study based on the replies of over 800 students, we try to determine which feeling is more efficient in viral marketing campaigns. We also try to determine how viral campaigns are received and handled as well as students view on viral marketing as a phenomenon.</p><p>This report shows that receivers of viral marketing campaigns have a pattern in the way they act as a result of it. Receivers who view one viral marketing campaign as spam, block the messages sender or delete the message are likely to view all campaigns as spam, no matter which type of viral marketing campaign they receive. This pattern does not exist for those who choose to forward viral messages, nor does the strength of the feeling matter. However, we are able to distinguish that campaigns based on sadness, anger, fear and disgust are forwarded more than campaigns based on other feelings. These types of campaigns are often forwarded by women. Campaigns based on sick humor or surprise are more commonly forwarded by men. However, women are more likely to forward viral messages.</p><br><p>Virusmarknadsföring är en typ av marknadsföring som går ut på att individer inom sociala nätverk skickar ett budskap vidare till varandra. När marknadsföringsformen fungerar är den mycket billig och effektiv. Det finns ett flertal exempel på framgångsrika virusmarknadsföringskampanjer som lyckats och gett produkter eller företag stor framgång.</p><p>Virusmarknadsföringen som fenomen är relativt outforskad och det finns olika förslag på vägar att gå för att forma en framgångsrik kampanj. Bland annat kan virusmarknadsförare spela på individers känslor för att få dem att skicka ett budskap vidare inom sitt sociala nätverk. I denna uppsats tittar vi närmare på just detta, och tar reda på vilka känslor som bäst lämpar sig för en virusmarknadsföringskampanj. Genom en kvantitativ undersökning där cirka 800 studenter från Blekinge Tekniska Högskola och Högskolan i Gävle deltagit tar vi också reda på hur synen på virusmarknadsföring ser ut, samt vilken reaktion det får när det mottas.</p><p>Detta examensarbete visar att de som tar emot virusmarknadsföring har ett mönster i sitt agerande. De som ser en virusmarknadsföringskampanj som spam eller till och med blockerar avsändaren, gör detsamma för oberoende av vilken typ av kampanj de mottar. Samma sak gäller de som väljer att radera meddelandet. Mönstret i agerandet gäller dock inte för de som skickar budskap vidare. Hur stark känsla som väcks av kampanjen spelar heller ingen roll. Dock tycker vi oss se att virusmarknadsföringskampanjer baserade på sorg, ilska, rädsla och äckel fungerar bättre än andra kampanjer. Dessa skickas oftast vidare av kvinnor. Män skickar inte virusmarknadsföringskampanjer vidare lika ofta som kvinnor. När de gör det så väljer de dock att skicka vidare sjuk humor eller budskap baserade på förvåning.</p>
APA, Harvard, Vancouver, ISO, and other styles
32

Sroufe, Paul. "E‐Shape Analysis." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc12201/.

Full text
Abstract:
The motivation of this work is to understand E-shape analysis and how it can be applied to various classification tasks. It has a powerful feature to not only look at what information is contained, but rather how that information looks. This new technique gives E-shape analysis the ability to be language independent and to some extent size independent. In this thesis, I present a new mechanism to characterize an email without using content or context called E-shape analysis for email. I explore the applications of the email shape by carrying out a case study; botnet detection and two possible applications: spam filtering and social-context based finger printing. The second part of this thesis takes what I apply E-shape analysis to activity recognition of humans. Using the Android platform and a T-Mobile G1 phone I collect data from the triaxial accelerometer and use it to classify the motion behavior of a subject.
APA, Harvard, Vancouver, ISO, and other styles
33

Jägenstedt, Gabriel. "Analysis and Simulation of Threats in an Open, Decentralized, Distributed Spam Filtering System." Thesis, Linköpings universitet, Databas och informationsteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-81012.

Full text
Abstract:
The existance of spam email has gone from a fairly small amounts of afew hundred in the late 1970’s to several billions per day in 2010. Thiscontinually growing problem is of great concern to both businesses andusers alike.One attempt to combat this problem comes with a spam filtering toolcalled TRAP. The primary design goal of TRAP is to enable tracking ofthe reputation of mail senders in a decentralized and distributed fashion.In order for the tool to be useful, it is important that it does not haveany security issues that will let a spammer bypass the protocol or gain areputation that it should not have.As a piece of this puzzle, this thesis makes an analysis of TRAP’s protocoland design in order to find threats and vulnerabilies capable of bypassingthe protocol safeguards. Based on these threats we also evaluate possiblemitigations both by analysis and simulation. We have found that althoughthe protocol was not designed with regards to certain attacks on the systemitself most of the attacks can be fairly easily stopped.The analysis shows that by adding cryptographic defenses to the protocola lot of the threats would be mitigated. In those cases where cryptographywould not suffice it is generally down to sane design choices in the implementationas well as not always trusting that a node is being truthful andfollowing protocol.
APA, Harvard, Vancouver, ISO, and other styles
34

Mederle, Daniela. "Die Regulierung von Spam und unerbetenen kommerziellen E-Mails eine Studie zur Rechtslage in Deutschland, dem Vereinigten Königreich und den USA ; unter Berücksichtigung empirischer Daten und der ökonomischen Analyse des Rechts." Köln Heymann, 2009. http://d-nb.info/998914193/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Mederle, Daniela. "Die Regulierung von Spam und unerbetenen kommerziellen E-Mails : eine Studie zur Rechtslage in Deutschland, dem Vereinigten Königreich und den U.S.A. unter Berücksichtigung empirischer Daten und der ökonomischen Analyse des Rechts /." Köln : Heymann, 2010. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018767320&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Kigerl, Alex Conrad. "An Empirical Assessment of the CAN SPAM Act." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/704.

Full text
Abstract:
In January 2004, the United States Congress passed and put into effect the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN SPAM). The Act was set forth to regulate bulk commercial email (spam) and set the limits for what was acceptable. Various sources have since investigated and speculated on the efficacy of the CAN SPAM Act, few of which report a desirable outcome for users of electronic mail. Despite the apparent consensus of anti-spam firms and the community of email users that the Act was less than effective, there is little to no research on the efficacy of the Act that utilizes any significant statistical rigor or accepted scientific practices. The present study seeks to determine what, if any, impact the CAN SPAM act had on spam messages, to identify areas of improvement to help fight spam that is both fraudulent and dangerous. The data consisted of 2,071,965 spam emails sent between February 1, 1998 and December 31, 2008. The data were aggregated by month and an interrupted time series design was chosen to assess the impact the CAN SPAM Act had on spam. Analyses revealed that the CAN SPAM Act had no observable impact on the amount of spam sent and received; no impact on two of three CAN SPAM laws complied with among spam emails, the remaining law of which there was a significant decrease in compliance after the Act; and no impact on the number of spam emails sent from within the United States. Implications of these findings and suggestions for policy are discussed.
APA, Harvard, Vancouver, ISO, and other styles
37

Almeida, Tiago Agostinho de. "SPAM = do surgimento à extinção." [s.n.], 2010. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260586.

Full text
Abstract:
Orientador: Akedo Yamakami<br>Tese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação<br>Made available in DSpace on 2018-08-16T13:44:58Z (GMT). No. of bitstreams: 1 Almeida_TiagoAgostinhode_D.pdf: 1582584 bytes, checksum: 8a444adaf46219a5200a75deb26be781 (MD5) Previous issue date: 2010<br>Resumo: Nos últimos anos, spams têm se tornado um importante problema com enorme impacto na sociedade. A filtragem automática de tais mensagens impõem um desafio especial em categorização de textos, no qual a característica mais marcante é que os filtros enfrentam um adversário ativo, que constantemente procura evadir as técnicas de filtragem. Esta tese apresenta um estudo abrangente sobre o problema do spamming. Dentre as contribuições oferecidas, destacam-se: o levantamento histórico e estatístico do fenômeno do spamming e as suas consequências, o estudo sobre a legalidade do spam e os recursos jurídicos adotados por alguns países, a análise de medidas de desempenho utilizadas na avaliação dos filtros de spams, o estudo dos métodos mais empregados para realizar a filtragem de spams, a proposta de melhorias dos filtros Bayesianos através da adoção de técnicas de redução de dimensionalidade e, principalmente, a proposta de um novo método de classificação baseado no princípio da descrição mais simples auxiliado por fatores de confidência. Vários experimentos são apresentados e os resultados indicam que a técnica proposta 'e superior aos melhores filtros anti-spams presentes tanto comercialmente quanto na literatura.<br>Abstract: Spam has become an increasingly important problem with a big economic impact in society. Spam filtering poses a special problem in text categorization, in which the defining characteristic is that filters face an active adversary, which constantly attempts to evade filtering. In this thesis, we present a comprehensive study of the spamming problem. Among many offered contributions we present: the statistical and historical survey of spamming and its consequences, a study regarding the legality of spams and the main juridic methods adopted by some countries, the study and proposal of new performance measures used for the evaluation of the spam classifiers, the proposals for improving the accuracy of Naive Bayes filters by using dimensionality reduction techniques and a novel approach to spam filtering based on the minimum description length principle and confidence factors. Furthermore, we have conducted an empirical experiments which indicate that the proposed classifier outperforms the state-of-the-art spam filters.<br>Doutorado<br>Automação<br>Doutor em Engenharia Elétrica
APA, Harvard, Vancouver, ISO, and other styles
38

Altermann, Karen. "Die Zulässigkeit unverlangter E-Mail-Werbung nach der UWG-Novelle : eine Darstellung der Ansprüche nach dem Wettbewerbsrecht, Zivilrecht einschließlich Unterlassungsklagengesetz, Datenschutzrecht und Markenrecht sowie der Folgen im Strafrecht /." Hamburg : Kovač, 2006. http://www.verlagdrkovac.de/3-8300-2348-0.htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Sontag, Ralph. "Hat Bayes eine Chance?" Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400556.

Full text
Abstract:
Workshop "Netz- und Service-Infrastrukturen" Hat Bayes eine Chance? Seit einigen Monaten oder Jahren werden verstärkt Bayes-Filter eingesetzt, um die Nutz-E-Mail ("`Ham"') vom unerwünschten "`Spam"' zu trennen. Diese stoßen jedoch leicht an ihre Grenzen. In einem zweiten Abschnitt wird ein Filtertest der Zeitschrift c't genauer analysiert.
APA, Harvard, Vancouver, ISO, and other styles
40

Neuwirth, David. "Realizace spamového filtru na bázi umělého imunitního systému." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2009. http://www.nusl.cz/ntk/nusl-236637.

Full text
Abstract:
Unsolicited e-mails generally present a major problem within the e-mail communication nowadays. There exist several methods that can detect spam and distinguish it from the requested messages. The theoretical part of the masters thesis introduces the ways of detecting unsolicited messages by using artificial immune systems. It presents and subsequently analyses several methods of the artificial immune systems that can assist in the fight against spam. The practical part of the masters thesis deals with the implementation of a spam filter on the basis of the artificial immune systems. The project ends with comparison of effectiveness of the newly designed spam filter and the one which uses common methods for spam detection.
APA, Harvard, Vancouver, ISO, and other styles
41

Deng, Ni. "A secure, payment-based email delivery system." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Silva, Renato Moraes 1988. "Contribuições ao combate de web spamming." [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260665.

Full text
Abstract:
Orientadores: Akebo Yamakami, Tiago Agostinho de Almeida<br>Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação<br>Made available in DSpace on 2018-08-22T13:22:48Z (GMT). No. of bitstreams: 1 Silva_RenatoMoraes_M.pdf: 4136928 bytes, checksum: 218846058592353cb167c8c2d61e1bfd (MD5) Previous issue date: 2013<br>Resumo: Com o crescente aumento do volume de informações disponíveis na Web, as ferramentas de busca tornam-se cada vez mais importantes para os usuários da Internet. Consequentemente, com o objetivo de se tornar mais visíveis, os sites concorrem entre si para ganhar melhores posições nos resultados das buscas feitas por esses usuários. Porém, muitos ganham maior visibilidade através de estratégias que enganam as ferramentas de busca. Esses sites, conhecidos como Web spam, causam prejuízos pessoais e econômicos aos usuários. Diante desse cenário, este trabalho apresenta uma análise do desempenho de diversos métodos de aprendizado de máquina aplicados na detecção automática de Web hosts que propagam Web spam. Os experimentos foram realizados usando duas bases de dados reais, públicas e de grande porte, das quais foram extraídos três diferentes conjuntos de vetores de atributos: baseados no conteúdo das páginas Web, baseados nos links das páginas Web e formados pela transformação dos atributos baseados nos links. Também foi analisada a viabilidade da redução de dimensionalidade do espaço dos atributos. Outra contribuição desse trabalho é a proposta de uma abordagem de classificação de Web spam, em que as predições obtidas com cada tipo de vetor de atributos são combinadas e uma decisão final é obtida usando-se voto majoritário simples. Os resultados obtidos indicam que os métodos de bagging de árvores de decisão, redes neurais perceptron de múltiplas camadas, floresta aleatória e boosting adaptativo de árvores de decisão são promissores na tarefa de detecção de Web spam. Além disso, verificou-se que os métodos de aprendizado tem melhor desempenho quando os vetores de atributos baseados no conteúdo e os vetores formados pela transformação dos atributos baseados nos links são combinados. Por fim, a combinação das predições obtidas com cada tipo de vetor de atributos gera bons resultados e por isso, essa é uma abordagem recomendada para o combate de Web spamming<br>Abstract: Due to the increasing volume of information available on the Web, search engines become increasingly important to Internet users. Consequently, with the purpose of becoming more visible, the Web sites compete to achieve better positions in the results of the searches made by such users. However, many of them achieve a good visibility through strategies that try to circumvent the search engines. This kind of Web sites are known as Web spam and they are responsible for personal injury and economic losses to users. Given this scenario, this work presents a performance analysis of established machine learning techniques employed to automatically detect Web hosts that disseminate Web spam. The experiments were performed with two real, public and large datasets, from which were extracted three different sets of features vectors: contentbased ones, link-based ones and features vectors generated by the transformation of the link-based features. We also analyzed the viability of the dimensionality reduction of the feature space. Another contribution of this work is the proposal of a Web spam classification approach which combines the predictions achieved by each type of features vector and using a simple majority voting. The results indicate that bagging of decision trees, multilayer perceptron neural networks, random forest and adaptive boosting of decision trees are promising in the task of spam hosts classification. Furthermore, we have conclude that the learning techniques perform better when we have combined the content-based features vectors and the features vectors generated by the transformation of the link-based features. Finally, the combination of the predictions achieved with each type of features vector has achieved superior results and therefore it is a recommended approach to automatically detect Web spam<br>Mestrado<br>Automação<br>Mestre em Engenharia Elétrica
APA, Harvard, Vancouver, ISO, and other styles
43

Ormane, Elina. "Spam as an Advertising Tool : Possibilities in drawing people’s attention using carefully thought-out and aimed at the right market spam advertisement." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Företagsekonomi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-18619.

Full text
Abstract:
It has been considered that spam is one of the worst advertising tools in the Internet because of wide range of porno, Viagra, luxury brands’ replicas and other unwanted mailings all over the world; nevertheless, a lot of companies continue to use this tool for products’ or services’ introduction to their potential clients and partners. According to the author’s personal four-year-experience in marketing field, the mostly asked question by companies is how to advertise the product or service to new potential partners or clients using spam without losing the reputation of the company. The author wishes to investigate whether it is possible by carefully thought-out and aimed at the right market spam advertisement to draw people’s attention. This study employs partly quantitative and partly qualitative research approach. Empirical data collection is organized through questionnaires and personal mailing experiment. Random people who filled in the first questionnaire were from the author’s personal network all over the world. Regarding the second questionnaire the author has chosen to research Commonwealth of Independent States (CIS) as the area of medium-sized companies’ location. The author used 2 million American e-mail addresses in her personal mailing experiment. In order to analyze the findings through a set of graphical techniques exploratory data analysis was used. Both questionnaires consisted from dichotomous (Yes-no) questions, alternative questions, wh-questions and descriptive questions, analysis of which incorporated through the literature review. In addition to this, personal mailing experiment is present in the study where the author tests the attitude towards spam and the perception of advertisement based on the literature review as well. It became clear that it is possible by carefully thought-out and aimed at the right market spam advertisement to draw people’s attention. The author’s experiment has proved that there are some people or the e-mail users who actually buy products advertised in spam e-mails. One of the factors that influence attitude towards e-mails might be because of the particular spam usefulness or low time consumption but the success of the online advertisement depends on people’s perception. In the particular case the attitude towards advertisement was determined by advertisement’s execution and feelings transferred by it. It is important to remember that advertisers have to take main nuances into account when introducing products or services to new clients or partners, such as clear understanding of spam mailing goals, topics of interest, perception of visual information, time of advertisement, and trust.
APA, Harvard, Vancouver, ISO, and other styles
44

Webb, Steve. "Automatic identification and removal of low quality online information." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26669.

Full text
Abstract:
Thesis (Ph.D)--Computing, Georgia Institute of Technology, 2009.<br>Committee Chair: Pu, Calton; Committee Member: Ahamad, Mustaque; Committee Member: Feamster, Nick; Committee Member: Liu, Ling; Committee Member: Wu, Shyhtsun Felix. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
45

Laurent-Ricard, Eric. "Rétablir la confiance dans les messages électroniques : Le traitement des causes du "spam"." Thesis, Paris 2, 2011. http://www.theses.fr/2011PA020085/document.

Full text
Abstract:
L'utilisation grandissante de la messagerie électronique dans les échanges dématérialisés, aussi bien pour les entreprises que pour les personnes physiques, et l'augmentation du nombre de courriers indésirables, nommés « spams » (pourriels) génèrent une perte de temps importante de traitement manuel, et un manque de confiance à la fois dans les informations transmises et dans les émetteurs de ces messages. Quels sont les solutions pour rétablir ou établir la confiance dans ces échanges ? Comment traiter et faire diminuer le nombre grandissant de « spams » ? Les solutions existantes sont parfois lourdes à mettre en oeuvre ou relativement peu efficaces et s’occupent essentiellement de traiter les effets du « spam », en oubliant d’analyser et de traiter les causes. L'identification, si ce n'est l'authentification de l'émetteur et des destinataires, est un des points clés permettant de valider l'origine d'un message et d’en garantir le contenu, aussi bien qu’un niveau important de traçabilité, mais ce n’est pas le seul, et les mécanismes de base mêmes de la messagerie électronique, plus précisément au niveau des protocoles de communication sont également en jeu. Le contenu de cette thèse portera plus spécifiquement sur les possibilités liées aux modifications de certains protocoles de l'Internet, en particulier le protocole SMTP, la mise en oeuvre de spécifications peu utilisées, et les outils et méthodes envisageables pour garantir l’identification des parties de façon simple et transparente pour les utilisateurs. L’objectif est de définir, d'une part une méthodologie d'utilisation de la messagerie pouvant assurer fiabilité et confiance, et d'autre part de rédiger les bases logiques de programmes clients et serveurs pour la mise en application de cette méthodologie<br>The growing use of email in dematerialized exchanges, for both businesses and individuals, and the increase of undesirable mails, called "spam" (junk emails) generate a significant loss of time of manual processing And a lack of confidence both in the information transmitted and the issuers of such messages. What are the solutions to restore or build confidence in these exchanges? How to treat and reduce the growing number of «spam»?Existing solutions are often cumbersome to implement or relatively ineffective and are primarily concerned with treating the effects of "«spam»", forgetting to analyze and address the causes.The identification, if not the authentication, of the sender and recipients, is a key point to validate the origin of a message and ensure the content, as well as a significant level of traceability, but it is not the only one, and the basic mechanisms, themselves, of the email system, more precisely in terms of communication protocols are also at stake.The content of this thesis will focus primarily on opportunities related to changes in some Internet protocols, in particular SMTP, implementation specifications rarely used, and the tools and possible methods to ensure the identification of parties in a simple and transparent way for users.The objective is to define, firstly a methodology for using the mail with reliability and confidence, and secondly to draw the logical foundations of client and server programs for the implementation of this methodology
APA, Harvard, Vancouver, ISO, and other styles
46

Trasobares, Mario, and Anna Tretjakova. "Unsolicited Commercial E-mails : A study of the consumer’s perceptions about unsolicited commercial e-mails and the implications it has for Internet user groups." Thesis, Umeå University, Umeå School of Business, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-35032.

Full text
Abstract:
<p>The rapid development of Internet technologies has led to the emergence of new communication means. E-mail has become a new powerful tool used by millions with the main purpose of exchanging information. Considering its large scope, marketers have been using the e-mail as an important direct marketing force and it has become a popular choice for many companies. The e-mail has therefore constituted a new form of on-line marketing coined “E-mail marketing”. However, the increasing use of the e-mail marketing has been adversely affected by the appearance of non-traditional marketing communication media such as unsolicited commercial e-mails (UCEs). The main reasons behind the alarming growth of the UCEs are those explained by the low-cost structure of the e-mail and, thus, a small number of responses are required for generating a profit (Moustakas <em>et al.</em>, 2006; p.45; Shenoy, 2008; p.32). This unsolicited medium used for reaching consumers has evolved from mere nuisance to actual threat (Mendleson, 2010; p.38), which has brought a new complexity into consumers’ daily lives. This in its turn calls for examination of consumer’s perception about the unsolicited commercial e-mails.</p><p> </p><p>Hence, the aim of this thesis is to examine consumer’s perceptions about the mentioned unsolicited marketing communication medium. This will provide increased awareness of the profound implications that the UCEs have on e-commerce and the e-mail marketing on the whole and, particularly, on Internet user groups such as companies, e-mail service providers and policy makers. The study was conducted with a positivistic position and followed a deductive approach, taking known theories as point of departure. The theories presented are mainly concerned with: privacy, ethical and legislation issues; consumer’s reactions and motives behind the opening of the e-mail; the impact of the UCEs on the brand image and overall implications of the UCEs.</p><p> </p><p>A self-completion questionnaire was used as method of data collection. The results indicate that the UCEs are perceived as slightly unethical and neither intrusive nor nonintrusive by the respondents. There is also no clear perceived protection by the anti-spam law, which claims the need for improvement of the policy makers’ work. The results also reveal that the most common consumer’s reaction is to disregard and delete the UCEs, although a small but considerable percentage of the consumers respond. The findings show that the different contents of the UCEs are perceived with low levels of interest by the respondents. Also, the motives behind the opening of the UCEs by the respondents are distributed nearly equal: the credibility of the sender, simply the curiosity and the attractiveness of the subject line. This study reveals a fairly negative perceived image of the companies advertised by the UCEs, which proves the associated cost of sending the UCEs. Furthermore, it has been found that the respondents are concerned about sharing their e-mail addresses with e-companies because of the UCEs and that the latter hinder the accessibility to solicited commercial e-mails in the e-mail inboxes. The e-mail service providers have been also affected since a quarter of the respondents have changed them as a consequence of receiving the UCEs. Thus, the results of this thesis show the adverse implications of the UCEs on electronic commerce, e-mail marketing and on Internet user groups.</p>
APA, Harvard, Vancouver, ISO, and other styles
47

Bergens, Simon, and Pontus Frykengård. "Skräppost eller skinka? : En jämförande studie av övervakade maskininlärningsalgoritmer för spam och ham e-mailklassifikation." Thesis, Uppsala universitet, Institutionen för informatik och media, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-389384.

Full text
Abstract:
Spam messages in the form of e-mail is a growing problem in today's businesses. It is a problem that costs time and resources to counteract. Research into this has been done to produce techniques and tools aimed at addressing the growing number on incoming spam e-mails. The research on different algorithms and their ability to classify e-mail messages needs an update since both tools and spam e-mails have become more advanced. In this study, three different machine learning algorithms have been evaluated based on their ability to correctly classify e-mails as legitimate or spam. These algorithms are naive Bayes, support vector machine and decision tree. The algorithms are tested in an experiment with the Enron spam dataset and are then compared against each other in their performance. The result of the experiment was that support vector machine is the algorithm that correctly classified most of the data points. Even though support vector machine has the largest percentage of correctly classified data points, other algorithms can be useful from a business perspective depending on the task and context.
APA, Harvard, Vancouver, ISO, and other styles
48

Möller, Manuel. "Spamerkennung mit Support Vector Machines." Thesis, Universitätsbibliothek Chemnitz, 2005. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200500580.

Full text
Abstract:
Diese Arbeit zeigt ausgehend von einer Darstellung der theoretischen Grundlagen automatischer Textklassifikation, dass die aus der Statistical Learning Theory stammenden Support Vector Machines geeignet sind, zu einer präziseren Erkennung unerwünschter E-Mail-Werbung beizutragen. In einer Testumgebung mit einem Corpus von 20 000 E-Mails wurden Testläufe verschiedene Parameter der Vorverarbeitung und der Support Vector Machine automatisch evaluiert und grafisch visualisiert. Aufbauend darauf wird eine Erweiterung für die Open-Source-Software SpamAssassin beschrieben, die die vorhandenen Klassifikationsmechanismen um eine Klassifikation per Support Vector Machine erweitert.
APA, Harvard, Vancouver, ISO, and other styles
49

Hübner, Uwe. "Netz- und Service-Infrastrukturen." Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Ільченко, Дмитро Олександрович, та Dmytro Ilchenko. "Методи і засоби захисту серверів електронної пошти від спаму". Master's thesis, Тернопільський національний технічний університет імені Івана Пулюя, 2021. http://elartu.tntu.edu.ua/handle/lib/36534.

Full text
Abstract:
Мета роботи полягає у підвищенні ефективності фільтрації спаму в електронних повідомленнях на основі алгоритмів класифікації текстової інформації в поєднанні з класичними методами обробки. У дипломній роботі магістра проведений аналіз проблем передачі електронних повідомлень. Досліджено методи і засоби побудови систем захисту серверів електронної пошти від поширення нелегітимної кореспонденції. Розроблена векторна модель електронного повідомлення з виявленням стійких словосполучень. Розроблено програмне забезпечення на основі поєднання формальних методів фільтрації електронних повідомлень та нейронної мережі ART. Обґрунтовано застосування алгоритмів фільтрації електронних повідомлень на основі показників їх ефективності.<br>The aim of the work is to increase the efficiency of spam filtering in e-mails based on algorithms for classifying textual information in combination with classical processing methods. In the master's thesis the analysis of problems of transmission of electronic messages is carried out. Methods and means of building systems for protecting e-mail servers from the spread of illegitimate correspondence have been studied. A vector model of an electronic message with the detection of stable phrases has been developed. Software based on a combination of formal methods of electronic message filtering and ART neural network has been developed. The application of electronic message filtering algorithms based on their efficiency indicators is substantiated.<br>ПЕРЕЛІК ОСНОВНИХ УМОВНИХ ПОЗНАЧЕНЬ, СИМВОЛІВ І СКОРОЧЕНЬ 8 ВСТУП 9 РОЗДІЛ 1 АНАЛІЗ ПРОБЛЕМ ПЕРЕДАЧІ ЕЛЕКТРОННИХ ПОВІДОМЛЕНЬ 12 1.1. Розвиток технічних методів розсилки і методів фільтрації спаму 12 1.2. Ознаки спаму 16 1.3. Технологічні особливості розповсюдження спаму 19 1.4. Аналіз програмних систем захисту поштових сервісів 27 РОЗДІЛ 2 АЛГОРИТМИ ОБРОБКИ І ФІЛЬТРАЦІЇ ЕЛЕКТРОННИХ ПОВІДОМЛЕНЬ 30 2.1. Алгоритми формальних методів фільтрації 31 2.2. Модель текстового контенту електронних листів 40 2.3. Векторна модель електронного повідомлення і завдання класифікації 41 2.4. Виявлення стійких словосполучень в тексті листа 44 РОЗДІЛ 3 ІНФОРМАЦІЙНЕ ЗАБЕЗПЕЧЕННЯ СИСТЕМИ КОНТЕНТНОЇ ФІЛЬТРАЦІЇ ЕЛЕКТРОННОЇ КОРЕСПОНДЕНЦІЇ 48 3.1. Розробка архітектури спам фільтра 48 3.2. Розробка алгоритмів нейромережевого класифікатора 51 3.3. Дослідження роботи системи контентної фільтрації електронної пошти 57 РОЗДІЛ 4 ОХОРОНА ПРАЦІ ТА БЕЗПЕКА В НАДЗВИЧАЙНИХ СИТУАЦІЯХ 65 4.1. Охорона праці 65 4.2. Оцінка стійкості роботи об’єкту економіки до впливу ударної хвилі ядерного вибуху 68 ВИСНОВКИ 72 СПИСОК ВИКОРИСТАНИХ ДЖЕРЕЛ 73 Додаток A. Тези конференцій 75
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography