Email Threats and Its Security Establishing Methods By Focusing On The Comparison Of Five Security Methods; HC, CE, ABS, CBF, RS

سال انتشار: 1392
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,223

فایل این مقاله در 6 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

BPJ01_008

تاریخ نمایه سازی: 29 دی 1392

چکیده مقاله:

Take a look at statistics and figures of victims for internet attacks indicates that internet aggressors are growing quite coincidentally with the development of technology. Nowadays, there are a few people who do not deal with email and for sure email users usually have been encountered with internet attacks that internet spam are among them .These spam are appeared in malware-based and deceptive forms. Most of the time in order to recognize spam user is faced with problem. In this study attempts were put on identifying the current risks of internet to users and provide resistance solutions against internet attacks

نویسندگان

Saber Pahlavan

sama technical and vocational training college, Islamic Azad University, Amol Branch, Amol, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • _ Conference on New Approaches in Computer Engineering and Information ...
  • M. Shao, G. Wang, and J. Zhou, "Some common attacks ...
  • Information Systems, National Pingtung University of Science and Technology, No. ...
  • Y. Wang, C. Lin, and Q. Lin Li, "Performance analysis ...
  • authentication mechanisms, " Bar lan University, Computer Science Department, Ramat ...
  • C. Lopes, P. Cortez, and M. Rio, "Symbiotic filtering for ...
  • M. Sunner, "Email security best practice, " Network Security, December ...
  • A. Bergholz, J. Beer, and S. Glahn, "New filtering approaches ...
  • http : //www. itsecurity. c om/features/9 -emai I-security- tips-112006/ ...
  • J. Jensen, "A Novel Testbed for Detection of Third ...
  • International Conference _ Availability, Reliability and Security, DOI 10.1 _ ...
  • _ Marhusin, D. Cormforth and H. Larkin, "Malicious Code Detection ...
  • Intelligence, Networking, and P aral le I/Distributed Computing, 2008 IEEE.pp.1-4 ...
  • نمایش کامل مراجع