Email Threats and Its Security Establishing Methods By Focusing On The Comparison Of Five Security Methods; HC, CE, ABS, CBF, RS
Publish place: First National Conference on Advances in computer science and information retrieval approaches
Publish Year: 1392
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,244
This Paper With 6 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
BPJ01_008
تاریخ نمایه سازی: 29 دی 1392
Abstract:
Take a look at statistics and figures of victims for internet attacks indicates that internet aggressors are growing quite coincidentally with the development of technology. Nowadays, there are a few people who do not deal with email and for sure email users usually have been encountered with internet attacks that internet spam are among them .These spam are appeared in malware-based and deceptive forms. Most of the time in order to recognize spam user is faced with problem. In this study attempts were put on identifying the current risks of internet to users and provide resistance solutions against internet attacks
Keywords:
Authors
Saber Pahlavan
sama technical and vocational training college, Islamic Azad University, Amol Branch, Amol, Iran
مراجع و منابع این Paper:
لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :