Spamming

Results: 11865



#Item
641Computing / Cyberspace / Music industry / Spamming / Librarian / Library science / Email / Carla Hayden / Ambition / There Is Only Now

Cites & Insights Crawford at Large Volume 3, Number 14: DecemberISSN

Add to Reading List

Source URL: www.citesandinsights.info

Language: English - Date: 2006-07-15 15:54:42
642Marketing / World Wide Web / Computing / Internet marketing / E-commerce / Email / Spamming / Affiliate marketing / Online advertising / Email spam / Advertising / Amazon.com

PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs  ∗

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2012-10-30 14:26:10
643Spamming / Confidence tricks / Identity theft / Email / Social engineering / Phishing / Internet fraud / Outlook.com / Email spam / Spoofed URL

Important Information About Internet Fraud “Phishing” is an online scam involving fraudulent email messages asking for confidential information such as passwords or account numbers. These emails, which are disguised

Add to Reading List

Source URL: texascollegesavings.com

Language: English - Date: 2014-08-25 10:04:17
644Cryptography / Spamming / Key management / Public-key cryptography / Computer security / Spam filtering / Password / Whitelist / Persona / Key / Email client / Phishing

The Strengths of Weaker Identities: Opportunistic Personas∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:02
645Computing / Cyberspace / Spamming / Spam filtering / Statistical classification / Internet / Email / Anti-spam techniques / Support vector machine

Harnessing Unlabeled Examples through Iterative Application of Dynamic Markov Modeling Gordon V. Cormack University of Waterloo, Waterloo, ON, N2L 3G1, Canada

Add to Reading List

Source URL: plg.uwaterloo.ca

Language: English - Date: 2006-08-21 04:32:19
646Cybercrime / Spamming / Security / Crime / Social engineering / Identity theft / Phishing / Computer security / World Wide Web

JPCERT/CC Incident Handling Report[January 1, 2015 – March 31, 2015]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2015-06-29 20:52:09
647Spamming / Project management / Cross-platform software / Data management / Spam filtering / Email spam / Deliverable / Email / Work breakdown structure / Gmail

Microsoft Word - QLectives_D444.v1.docx

Add to Reading List

Source URL: qlectives.eu

Language: English - Date: 2013-08-26 08:16:43
648Algebra / Mathematics / Computing / Functional analysis / Linear algebra / Kernel / Matrices / Numerical linear algebra / Email spam / Group representation / Spamming

Hash Kernels & Linear Models Vector Space Model for Text f (x) = hw, xi + b = i

Add to Reading List

Source URL: www.mlss2014.com

Language: English - Date: 2014-07-10 12:00:20
649Spam filtering / Spamming / Email / Anti-spam / Cross-platform software / SpamAssassin / Anti-spam techniques / Email spam / Email filtering / Conference on Email and Anti-Spam / SpamBayes / Whitelist

Autonomous Personal Filtering Improves Global Spam Filter Performance Gordon V. Cormack and Mona Mojdeh Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, Canada

Add to Reading List

Source URL: plg.uwaterloo.ca

Language: English - Date: 2009-05-28 18:42:12
650Email / Email spam / Spamming / Lansing /  Michigan / Computing / Cyberspace / Geography of Michigan

Ingham County Environmental Health Certified Point of Sale Inspectors Jeff Albert Albert Well and Septic Inspect, LLC PO Box 80476

Add to Reading List

Source URL: hd.ingham.org

Language: English - Date: 2014-06-06 16:34:27
UPDATE