Dissertations / Theses on the topic 'Spam messages'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 17 dissertations / theses for your research on the topic 'Spam messages.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Cheung, Pak-to Patrick. "A study on combating the problem of unsolicited electronic messages in Hong Kong." Click to view the E-thesis via HKUTO, 2007. http://sunzi.lib.hku.hk/hkuto/record/B38608248.
Full textMartins, Da Cruz José Márcio. "Contribution au classement statistique mutualisé de messages électroniques (spam)." Phd thesis, École Nationale Supérieure des Mines de Paris, 2011. http://pastel.archives-ouvertes.fr/pastel-00637173.
Full textCruz, José Marcio Martins da. "Contribution au classement statistique mutualisé de messages électroniques (spam)." Paris, ENMP, 2011. https://pastel.archives-ouvertes.fr/pastel-00637173.
Full textSince the 90's, different machine learning methods were investigated and applied to the email classification problem (spam filtering), with very good but not perfect results. It was always considered that these methods are well adapted to filter messages to a single user and not filter to messages of a large set of users, like a community. Our approach was, at first, look for a better understanding of handled data, with the help of a corpus of real messages, before studying new algorithms. With the help of a logistic regression classifier with online active learning, we could show, empirically, that with a simple classification algorithm coupled with a learning strategy well adapted to the real context it's possible to get results which are as good as those we can get with more complex algorithms. We also show, empirically, with the help of messages from a small group of users, that the efficiency loss is not very high when the classifier is shared by a group of users
Cheung, Pak-to Patrick, and 張伯陶. "A study on combating the problem of unsolicited electronic messages inHong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B38608248.
Full textRajdev, Meet. "Fake and Spam Messages: Detecting Misinformation During Natural Disasters on Social Media." DigitalCommons@USU, 2015. https://digitalcommons.usu.edu/etd/4462.
Full textLaurent-Ricard, Eric. "Rétablir la confiance dans les messages électroniques : Le traitement des causes du "spam"." Thesis, Paris 2, 2011. http://www.theses.fr/2011PA020085/document.
Full textThe growing use of email in dematerialized exchanges, for both businesses and individuals, and the increase of undesirable mails, called "spam" (junk emails) generate a significant loss of time of manual processing And a lack of confidence both in the information transmitted and the issuers of such messages. What are the solutions to restore or build confidence in these exchanges? How to treat and reduce the growing number of «spam»?Existing solutions are often cumbersome to implement or relatively ineffective and are primarily concerned with treating the effects of "«spam»", forgetting to analyze and address the causes.The identification, if not the authentication, of the sender and recipients, is a key point to validate the origin of a message and ensure the content, as well as a significant level of traceability, but it is not the only one, and the basic mechanisms, themselves, of the email system, more precisely in terms of communication protocols are also at stake.The content of this thesis will focus primarily on opportunities related to changes in some Internet protocols, in particular SMTP, implementation specifications rarely used, and the tools and possible methods to ensure the identification of parties in a simple and transparent way for users.The objective is to define, firstly a methodology for using the mail with reliability and confidence, and secondly to draw the logical foundations of client and server programs for the implementation of this methodology
Kigerl, Alex Conrad. "An Empirical Assessment of the CAN SPAM Act." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/704.
Full textKaushik, Saket. "Policy-controlled email services." Fairfax, VA : George Mason University, 2007. http://hdl.handle.net/1920/2937.
Full textTitle from PDF t.p. (viewed Jan. 18, 2008). Thesis directors: Paul Amman, Duminda Wijesekera. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Vita: p. 198. Includes bibliographical references (p. 189-197). Also available in print.
Sroufe, Paul Dantu Ram. "E-shape analysis." [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/ark:/67531/metadc12201.
Full textSroufe, Paul. "E‐Shape Analysis." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc12201/.
Full textQvist, Olof, and Julia Berggren. "Viral Marketing : How does the individual view a viral marketing message and what makes him or her pass it along?" Thesis, University of Gävle, Department of Business Administration and Economics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-672.
Full textViral marketing is a form of marketing that is based on individuals sharing of a message within their social network. When viral marketing works, it’s cheap and efficient and there are several examples of successful viral marketing campaigns that has given products or companies great success.
Viral marketing is relatively unexplored as a phenomenon, and there are several different suggested paths to choose to form a successful campaign. One suggestion is that viral marketers base their campaigns on different feelings to make the individual share the campaign, or feeling, with its social network. This is one of the things that we are looking at in this report. With a quantitative study based on the replies of over 800 students, we try to determine which feeling is more efficient in viral marketing campaigns. We also try to determine how viral campaigns are received and handled as well as students view on viral marketing as a phenomenon.
This report shows that receivers of viral marketing campaigns have a pattern in the way they act as a result of it. Receivers who view one viral marketing campaign as spam, block the messages sender or delete the message are likely to view all campaigns as spam, no matter which type of viral marketing campaign they receive. This pattern does not exist for those who choose to forward viral messages, nor does the strength of the feeling matter. However, we are able to distinguish that campaigns based on sadness, anger, fear and disgust are forwarded more than campaigns based on other feelings. These types of campaigns are often forwarded by women. Campaigns based on sick humor or surprise are more commonly forwarded by men. However, women are more likely to forward viral messages.
Virusmarknadsföring är en typ av marknadsföring som går ut på att individer inom sociala nätverk skickar ett budskap vidare till varandra. När marknadsföringsformen fungerar är den mycket billig och effektiv. Det finns ett flertal exempel på framgångsrika virusmarknadsföringskampanjer som lyckats och gett produkter eller företag stor framgång.
Virusmarknadsföringen som fenomen är relativt outforskad och det finns olika förslag på vägar att gå för att forma en framgångsrik kampanj. Bland annat kan virusmarknadsförare spela på individers känslor för att få dem att skicka ett budskap vidare inom sitt sociala nätverk. I denna uppsats tittar vi närmare på just detta, och tar reda på vilka känslor som bäst lämpar sig för en virusmarknadsföringskampanj. Genom en kvantitativ undersökning där cirka 800 studenter från Blekinge Tekniska Högskola och Högskolan i Gävle deltagit tar vi också reda på hur synen på virusmarknadsföring ser ut, samt vilken reaktion det får när det mottas.
Detta examensarbete visar att de som tar emot virusmarknadsföring har ett mönster i sitt agerande. De som ser en virusmarknadsföringskampanj som spam eller till och med blockerar avsändaren, gör detsamma för oberoende av vilken typ av kampanj de mottar. Samma sak gäller de som väljer att radera meddelandet. Mönstret i agerandet gäller dock inte för de som skickar budskap vidare. Hur stark känsla som väcks av kampanjen spelar heller ingen roll. Dock tycker vi oss se att virusmarknadsföringskampanjer baserade på sorg, ilska, rädsla och äckel fungerar bättre än andra kampanjer. Dessa skickas oftast vidare av kvinnor. Män skickar inte virusmarknadsföringskampanjer vidare lika ofta som kvinnor. När de gör det så väljer de dock att skicka vidare sjuk humor eller budskap baserade på förvåning.
Chen, Peng. "Detecting spam zombies by monitoring outgoing messages." 2008. http://etd.lib.fsu.edu/theses/available/etd-10212008-091932.
Full textAdvisor: Zhenhai Duan, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed Feb. 9, 2009). Document formatted into pages; contains viii, 34 pages. Includes bibliographical references.
Geissler, Michelle Lara. "Bulk unsolicited electronic messages (spam) : a South African perspective." Thesis, 2004. http://hdl.handle.net/10500/1141.
Full textCriminal & Procedural Law
LLD
Diale, Melvin. "Investigating unsupervised feature learning for email spam classification." Thesis, 2017. https://hdl.handle.net/10539/24027.
Full textIn the cyberspace, spam emails are used as a way to divulge sensitive information of victims through social engineering. There are various classi cation systems that have been employed previously to identify spam emails. The primary objective of email spam classi cation systems is to classify incoming email as either legitimate (non-spam) or spam emails. The spam classi cation task can thus be regarded as a two-class classi cation problem. This kind of a problem involves the use of various classi ers such as Decision Trees (DTs) and Support Vector Machines (SVMs). DTs and SVMs have been shown to perform well on email spam classi cation tasks. Several studies have failed to mention how these classi ers were optimized in terms of their hyperparameters. As a result, poor performance was encountered with complex datasets. This is because SVM classi er is dependent on the selection of the kernel function and the optimization of kernel hyperparameters. Additionally, many studies on spam email ltering task use words and characters to compute Term-Frequency (TF) based feature space. However, TF based feature space leads to sparse representation due to the continuous vocabulary growth. This problem is linked with the curse of dimensionality. Overcoming dimensionality issues involves the use of feature reduction techniques. Traditional feature reduction techniques, for instance, Information Gain (IG) may cause feature representations to lose important features for identifying spam emails. This proposed study demonstrates the use of Distributed Memory (DM), Distributed Bag of Words (DBOW), Cosine Similarity (CS) and Autoencoder for feature representation to retain a better class separability. Generated features enable classi ers to identify spam emails in a lower dimension feature space. The use of the Autoencoder for feature reduction led to improved classi cation performance. Furthermore, a comparison of kernel functions and CS measure is taken into consideration to evaluate their impacts on classi ers when employed for feature transformation. The study further shows that removal of more frequent words, which have been regarded as noisy words and stemming process, may negatively a ect the performance of the classi ers when word order is taken into consideration. In addition, this study investigates the performance of DTs and SVM classi ers on the publicly available datasets. This study makes a further investigation on the selection of optimal kernel function and optimization of kernel hyperparameters for each feature representation. It is further investigated whether the use of Stacked Autoencoder as a pre-processing step for multilayer perceptron (MLP) will lead to improved classi cation results.
MT 2018
Tladi, Sebolawe Erna Mokowadi. "The regulation of unsolicited electronic communications (SPAM) in South Africa : a comparative study." Thesis, 2017. http://hdl.handle.net/10500/25265.
Full textMercantile Law
LL. D.
Chen, Pei-chi, and 陳沛綺. "Detecting spam on Twitter via message-passing based on retweet-relation." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/19100812890900918032.
Full text國立臺灣科技大學
資訊工程系
102
The last few years, Twitter has become one of the most popular platforms for users to exchange real-time information on the Web. Due to the popularity of Twitter, it attracts malicious users' interests. Previous works focused on detecting Twitter spam accounts individually. Moreover, most of previous approaches relied on account features such as message similarity between tweets, following-followers ratio, and so on. Those features can be easily manipulated by spam accounts. Spam collusion is a new way to escape the detection mechanisms. Therefore, we propose a system based on analyzing information diffusion.
Huang, Hui-Ching, and 黃惠靜. "A Study on Consumer’s Orientation to Body SPA Space and Message Ways." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/18306207337327326318.
Full text明道大學
設計學院碩士班
101
The purpose of this study was to analyze massage techniques and spaces design which consumer preference. In response to the economy era of beauty and creative exerperience’s industries will coming. Body SPA industry was development in R.O.C. for a long time, but it almost focus on the quantitative of the massage techniques which consumer preference. For the massage techniques and space design which consumer preference, it lack of qualitative research. The study used the qualitative research, for the Body SPA operators and consumers which used the interview by field investigation. For the interview techniques which situations were at “relaxed” and “stress-free” to dialogue. The result showed the proprietors were mostly combined with variety of massage techniques in the type of massage. But the consumers preferred aromatherapy. In the space design, although there were a variety of styles available in the market, such as Bali style, Japanese Zen, Oriental Aesthetic or European style, The projection of the guidance principles for the space design almost focus on relax, comfortable, warm and covert for the proprietors, but for the type of styles which were unapparent. That was the reason why the consumers had not apparent preference any particular style of space design.