Conferences related to Electronic mail

Back to Top

2020 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC)

The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted papers will be peer reviewed. Accepted high quality papers will be presented in oral and postersessions, will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE


2020 IEEE 18th International Conference on Industrial Informatics (INDIN)

INDIN focuses on recent developments, deployments, technology trends, and research results in Industrial Informatics-related fields from both industry and academia


2020 IEEE Applied Power Electronics Conference and Exposition (APEC)

APEC focuses on the practical and applied aspects of the power electronics business. Not just a power designer’s conference, APEC has something of interest for anyone involved in power electronics including:- Equipment OEMs that use power supplies and converters in their equipment- Designers of power supplies, dc-dc converters, motor drives, uninterruptable power supplies, inverters and any other power electronic circuits, equipments and systems- Manufacturers and suppliers of components and assemblies used in power electronics- Manufacturing, quality and test engineers involved with power electronics equipment- Marketing, sales and anyone involved in the business of power electronic- Compliance engineers testing and qualifying power electronics equipment or equipment that uses power electronics


2020 IEEE International Conference on Consumer Electronics (ICCE)

The International Conference on Consumer Electronics (ICCE) is soliciting technical papersfor oral and poster presentation at ICCE 2018. ICCE has a strong conference history coupledwith a tradition of attracting leading authors and delegates from around the world.Papers reporting new developments in all areas of consumer electronics are invited. Topics around the major theme will be the content ofspecial sessions and tutorials.


2020 IEEE International Instrumentation and Measurement Technology Conference (I2MTC)

The Conference focuses on all aspects of instrumentation and measurement science andtechnology research development and applications. The list of program topics includes but isnot limited to: Measurement Science & Education, Measurement Systems, Measurement DataAcquisition, Measurements of Physical Quantities, and Measurement Applications.


More Conferences

Periodicals related to Electronic mail

Back to Top

Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications, IEEE Transactions on

Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


More Periodicals

Most published Xplore authors for Electronic mail

Back to Top

No authors for "Electronic mail"


Xplore Articles related to Electronic mail

Back to Top

Web concerns [legal aspects]

IEEE Micro, 1999

Recently, misuse of the Web seems to be cropping up everywhere. The author discusses three cases of misuse causing concern to many Web users: spamming, meta tagging, and keying advertising to searching.


Unsolicited commercial e-mail (UCE)

IEEE Antennas and Propagation Magazine, 2004

None


Group considers drastic measures to stop spam

Computer, 2003

None


Internet mail transfer and check system based on intelligence mobile agents

Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002), 2002

The Simple Mail Transfer Protocol (SMTP) based E-mail system is the most popular application in today's Internet world, but there are many dark clouds at the edge of the sunny sky. The two most well known threats are the "mail SPAM" and the "mail flooding attack". Mobile agents (MAs) are software agents that can transport themselves from a client computer ...


Collaborative Spam Filtering Using E-Mail Networks

Computer, 2006

Widespread Internet use has led to the emergence of several kinds of large- scale social networks in cyberspace, most notably e-mail networks. Unfortunately, the tremendous convenience that e-mail affords comes at a high price: Although the network's underlying connectivity is hidden, making it almost impossible to build a comprehensive directory of every individual's contact lists, e-mail addresses themselves can be ...


More Xplore Articles

Educational Resources on Electronic mail

Back to Top

IEEE-USA E-Books

  • Web concerns [legal aspects]

    Recently, misuse of the Web seems to be cropping up everywhere. The author discusses three cases of misuse causing concern to many Web users: spamming, meta tagging, and keying advertising to searching.

  • Unsolicited commercial e-mail (UCE)

    None

  • Group considers drastic measures to stop spam

    None

  • Internet mail transfer and check system based on intelligence mobile agents

    The Simple Mail Transfer Protocol (SMTP) based E-mail system is the most popular application in today's Internet world, but there are many dark clouds at the edge of the sunny sky. The two most well known threats are the "mail SPAM" and the "mail flooding attack". Mobile agents (MAs) are software agents that can transport themselves from a client computer to various servers for remote execution. Their mobility, autonomy and distributed intelligence are very friendly to today and tomorrow's Internet computation. In this paper, we introduce a prototype of the Internet mail transfer and check system based on intelligence mobile agents. This new system model can improve the current simple mail transfer protocol model to defend the mail SPAM and the mail flooding attack. Compatible with the traditional SMTP is the most important feature of our new model. Finally, we summarize some difficulties for turning this prototype model into practical software.

  • Collaborative Spam Filtering Using E-Mail Networks

    Widespread Internet use has led to the emergence of several kinds of large- scale social networks in cyberspace, most notably e-mail networks. Unfortunately, the tremendous convenience that e-mail affords comes at a high price: Although the network's underlying connectivity is hidden, making it almost impossible to build a comprehensive directory of every individual's contact lists, e-mail addresses themselves can be easily obtained from publicly available documents. Spammers have exploited this vulnerability to inundate users with unsolicited bulk e-mail. A distributed spam-filtering system that leverages e-mail networks' topological properties is more efficient and scalable than client-server-based solutions. Large-scale simulations of a prototype system reveal that this approach achieves a near- perfect spam-detection rate while minimizing bandwidth cost

  • An Innovative Spam Filtering Model Based on Support Vector Machine

    Spam is commonly defined as unsolicited email messages and the goal of spam categorization is to distinguish between spam and legitimate email messages. Many researchers have been trying to separate spam from legitimate emails using machine learning algorithms based on statistical learning methods. In this paper, an innovative and intelligent spam filtering model has been proposed based on support vector machine (SVM). This model combines both linear and nonlinear SVM techniques where linear SVM performs better for text based spam classification that share similar characteristics. The proposed model considers both text and image based email messages for classification by selecting an appropriate kernel function for information transformation

  • Research in Anti-Spam Method Based on Bayesian Filtering

    The study on content-based spam filtering is one of the important topics in the Internet security research area. And Bayesian classification method has expressed better performance on anti-spam. An improved new method that classifies spam filtering based on Bayesian filtering is proposed in this paper. The experiment results show that the new method has improved spam recall and spam precision.

  • Spam Detection with Complex-Valued Neural Network Using Behavior-Based Characteristics

    The paper proposes the use of the complex-valued neural network to detect spam. The main contributions of this work are two-fold. First, we present a new model based on the CVNN for classifying personal E-mails. We changed the input of the email into 2-dimensional vector. The complex-valued neural network is superior for handling 2-dimensional vector data stream, because the input of the complex-valued neural network has real part and imaginary part. Second, the behavior-based characteristics are extracted as most important features of the E-mail. The results reveal that the proposed technology is reliable, efficient and scalable.

  • Introductory materials

    None

  • Spam and the social-technical gap

    The runaway increase in spam cannot be stemmed by technical change alone. Spam currently constitutes up to 30 percent of all in-box messages. In these spam wars, as filters become more intelligent so do spammers' countermeasures. The continued growth of spam suggests the need for a new approach. Although most see spam as a personal problem, we suggest it is a social problem that needs a social response. Yet traditional social responses - law, courts, and the judiciary seem to work poorly in cyberspace. We propose bridging the gap between society and technology by applying social concepts to technology design.



Standards related to Electronic mail

Back to Top

No standards are currently tagged "Electronic mail"


Jobs related to Electronic mail

Back to Top