Search

Your search keyword '"Spam (Junk email) -- Analysis"' showing total 68 results

Search Constraints

Start Over You searched for: Descriptor "Spam (Junk email) -- Analysis" Remove constraint Descriptor: "Spam (Junk email) -- Analysis" Search Limiters Full Text Remove constraint Search Limiters: Full Text
68 results on '"Spam (Junk email) -- Analysis"'

Search Results

1. Reports Outline Information and Data Encoding and Encryption Research from School of Computer Science and Engineering (A novel and secured email classification and emotion detection using hybrid deep neural network)

2. Imam Abdulrahman Bin Faisal University Researcher Adds New Data to Research in Machine Learning (A lifelong spam emails classification model)

3. Will spam overwhelm our defenses? Evaluating offerings for drugs and natural health products

4. New Findings from Thapar Institute of Engineering & Technology in the Area of Computers Described (Protector: an Optimized Deep Learning-based Framework for Image Spam Detection and Prevention)

5. Spamalytics: an empirical analysis of spam marketing conversion

6. Who gets spammed?

7. Spammer beware! A survey of state statutes regulating unsolicited commercial email.

8. Us versus them

9. Is That Email Really From Apple?

10. Conficker Worm Arms Itself To Steal And Spam; The new variant, designated Conficker.E, is arriving through the worm's P2P connectivity

11. Studies Conducted at Beihang University on Soft Computing Recently Reported (Sentiment analysis and spam detection in short informal text using learning classifier systems)

12. Cybercriminals Playing Mind Games With Users; A study shows that spammers and phishers are playing on our biggest fears and our biggest desires

13. The Ticker

14. FTC Study Concludes Masking, Filtering Stop Spammers; Unmasked E-mail addresses received over 6,400 spam messages, while only it's readable by people but not by machines.one spam message reached masked E-mail addresses. Masking is the practice of altering an E-mail address so that

17. Mobile Text Message Spam Doubles; Spam accounts for close to half of all text messages sent to cell phones, a percentage that has more than doubled in just one year

19. Drugs, Phishing Top 2004 List Of Spam Terms; Terms related to pharmaceutical drugs and phishing scams topped the list of the most widely sent junk e-mail subject lines used by spammers this year, America Online Inc. said

20. Phishers Take Aim At EarthLink, Other ISPs; Phishers are widening their nets to include customers of Internet service providers (ISP), a security firm said

23. Rolex replaces Viagra as top spam

24. NOTES FROM THE FIELD: McAfee knocks, Scotch on the rocks - You call that spam?

26. THE TECHWEB SPIN: The Best Technology Blogs; The headline of this article is a lie, but, 'Hey, Mitch, What Links Do You Have In Your 'Best Technology Blogs' Folder' isn't very catch

28. Spam: Think Globally, Block Locally

29. Spammers Get Ready For April Fool's Day; Barracuda Networks, a maker of spam firewalls, says spammers are expected to intensify their efforts as April 1 nears

31. Fighting the worms of mass destruction - Internet security

33. Spam Nation; It's a [bad] part of our everyday lives. Who's behind this stuff?

34. Et Tu, AT&T Wireless?

37. Staff meeting, as seen by the spam filter: message intercepted

38. Spamming the World: In a popularity contest, 'bulk e-mailers' would rank just above child pornographers. But the scourge of the Internet is defending its vocation

39. NOTES FROM THE FIELD: Making new friends

40. Nailing your email campaign: need to reach your target market? The inbox is still the best way

41. Seems Somebody Is Clicking on That Spam

42. Irritated by spam? Get ready for spit

43. Search algorithms thwart would-be players. (After the Portal)

44. Spam/malware protection

45. Not all spam is spam

46. Spam Plague Infecting Major ISPs

47. Debate: organizations should be overly concerned about image-based spam

48. Introduction: controlling uninvited, inappropriate content from entering corporate inboxes is vital to business productivity

49. MS05-048

50. 'Spear phishing'

Catalog

Books, media, physical & digital resources