Search Results

There are 15770 results for: content related to: Using interactivity to help users understand the impact of spam filter settings

  1. Are Individual Investors Influenced by the Optimism and Credibility of Stock Spam Recommendations?

    Journal of Business Finance & Accounting

    Volume 40, Issue 9-10, November/December 2013, Pages: 1155–1183, Karen K. Nelson, Richard A. Price and Brian R. Rountree

    Article first published online : 17 DEC 2013, DOI: 10.1111/jbfa.12053

  2. Packet-level open-digest fingerprinting for spam detection on middleboxes

    International Journal of Network Management

    Volume 22, Issue 1, January/February 2012, Pages: 12–26, Muhammad N. Marsono

    Article first published online : 20 APR 2011, DOI: 10.1002/nem.780

  3. Filtering and email pricing as solutions to spam

    Canadian Journal of Economics/Revue canadienne d'économique

    Volume 46, Issue 3, August / août 2013, Pages: 881–899, B. Curtis Eaton, Ian A. MacDonald and Laura Meriluoto

    Article first published online : 20 AUG 2013, DOI: 10.1111/caje.12043

  4. Experience in management of e-mail delivery delay problems associated with spam e-mail filtering in a university

    Electronics and Communications in Japan

    Volume 95, Issue 1, January 2012, Pages: 8–19, Yutaka Hisanaga, Manabu Sugii, Yue Wang, Atsushi Osa and Hidetoshi Miike

    Article first published online : 21 DEC 2011, DOI: 10.1002/ecj.10393

  5. Filtering spam from bad neighborhoods

    International Journal of Network Management

    Volume 20, Issue 6, November/December 2010, Pages: 433–444, Ward van Wanrooij and Aiko Pras

    Article first published online : 15 OCT 2010, DOI: 10.1002/nem.753

  6. Wirebrush4SPAM: a novel framework for improving efficiency on spam filtering services

    Software: Practice and Experience

    Volume 43, Issue 11, November 2013, Pages: 1299–1318, N. Pérez-Díaz, D. Ruano-Ordas, F. Fdez-Riverola and J.R. Méndez

    Article first published online : 18 JUN 2012, DOI: 10.1002/spe.2135

  7. Spammers operations: a multifaceted strategic analysis

    Security and Communication Networks

    O. Thonnard, Pierre-Antoine Vervier and M. Dacier

    Article first published online : 9 OCT 2012, DOI: 10.1002/sec.640

  8. SpamED: A spam E-mail detection approach based on phrase similarity

    Journal of the American Society for Information Science and Technology

    Volume 60, Issue 2, February 2009, Pages: 393–409, Maria Soledad Pera and Yiu-Kai Ng

    Article first published online : 3 OCT 2008, DOI: 10.1002/asi.20962

  9. The hidden impacts of anti-spam measures and their contribution to the digital divide: An exploratory study

    Proceedings of the American Society for Information Science and Technology

    Volume 41, Issue 1, 2004, Pages: 176–183, Christopher P. Lueg

    Article first published online : 22 SEP 2005, DOI: 10.1002/meet.1450410120

  10. Using site-level connections to estimate link confidence

    Journal of the American Society for Information Science and Technology

    Volume 63, Issue 11, November 2012, Pages: 2294–2312, Jucimar Souza, André Carvalho, Marco Cristo, Edleno Moura, Pavel Calado, Paul-Alexandru Chirita and Wolfgang Nejdl

    Article first published online : 16 OCT 2012, DOI: 10.1002/asi.22729

  11. Adaptive speed tracking control for autonomous land vehicles in all-terrain navigation: An experimental study

    Journal of Field Robotics

    Volume 30, Issue 1, January / February 2013, Pages: 102–128, Jian Wang, Zhenping Sun, Xin Xu, Daxue Liu, Jinze Song and Yuqiang Fang

    Article first published online : 23 OCT 2012, DOI: 10.1002/rob.21440

  12. Detecting Non-personal and Spam Users on Geo-tagged Twitter Network

    Transactions in GIS

    Volume 18, Issue 3, June 2014, Pages: 370–384, Diansheng Guo and Chao Chen

    Article first published online : 13 JUN 2014, DOI: 10.1111/tgis.12101

  13. Simple SMS spam filtering on independent mobile phone

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1209–1220, M. Taufiq Nuruzzaman, Changmoo Lee, Mohd. Fikri Azli bin Abdullah and Deokjai Choi

    Article first published online : 21 JUN 2012, DOI: 10.1002/sec.577

  14. A link graph-based approach to identify forum spam

    Security and Communication Networks

    Youngsang Shin, Steven Myers, Minaxi Gupta and Predrag Radivojac

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.970

  15. Prioritized e-mail servicing to reduce non-spam delay and loss: A performance analysis

    International Journal of Network Management

    Volume 18, Issue 4, July/August 2008, Pages: 325–344, Muhammad N. Marsono, M. Watheq El-Kharashi and Fayez Gebali

    Article first published online : 26 JUL 2007, DOI: 10.1002/nem.664

  16. From spam filtering to information retrieval and back: Seeking conceptual foundations for spam filtering

    Proceedings of the American Society for Information Science and Technology

    Volume 42, Issue 1, 2005, Christopher P. Lueg

    Article first published online : 18 OCT 2006, DOI: 10.1002/meet.14504201146

  17. Dealing with spam: Some observations and recommendations

    Proceedings of the American Society for Information Science and Technology

    Volume 45, Issue 1, 2008, Pages: 1–2, Samuel P. Martin and Christopher P. Lueg

    Article first published online : 1 JUN 2009, DOI: 10.1002/meet.2008.1450450393

  18. SPAM over IP Telephony

    SIP Security

    Dorgham Sisalem, John Floroiu, Jiri Kuthan, Ulrich Abend, Henning Schulzrinne, Pages: 291–315, 2009

    Published Online : 11 MAY 2009, DOI: 10.1002/9780470516997.ch9

  19. Blocking spam by separating end-user machines from legitimate mail server machines

    Security and Communication Networks

    Fernando Sanchez, Zhenhai Duan and Yingfei Dong

    Article first published online : 27 JUN 2012, DOI: 10.1002/sec.587

  20. Securing Email, Chat, and Voice over IP

    Mac® Security Bible

    Joe Kissell, Pages: 257–313, 2011

    Published Online : 1 NOV 2011, DOI: 10.1002/9781118257739.ch9