Conferences related to Unsolicited electronic mail

Back to Top

ICC 2021 - IEEE International Conference on Communications

IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.


2020 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


2020 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2019 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


IEEE INFOCOM 2020 - IEEE Conference on Computer Communications

IEEE INFOCOM solicits research papers describing significant and innovative researchcontributions to the field of computer and data communication networks. We invite submissionson a wide range of research topics, spanning both theoretical and systems research.


More Conferences

Periodicals related to Unsolicited electronic mail

Back to Top

Antennas and Wireless Propagation Letters, IEEE

IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computing in Science & Engineering

Physics, medicine, astronomy—these and other hard sciences share a common need for efficient algorithms, system software, and computer architecture to address large computational problems. And yet, useful advances in computational techniques that could benefit many researchers are rarely shared. To meet that need, Computing in Science & Engineering (CiSE) presents scientific and computational contributions in a clear and accessible format. ...


Distributed Systems Online, IEEE

After nine years of publication, DS Online will be moving into a new phase as part of Computing Now (http://computingnow.computer.org), a new website providing the front end to all of the Computer Society's magazines. As such, DS Online will no longer be publishing standalone peer-reviewed articles.


More Periodicals

Most published Xplore authors for Unsolicited electronic mail

Back to Top

Xplore Articles related to Unsolicited electronic mail

Back to Top

Web concerns [legal aspects]

IEEE Micro, 1999

Recently, misuse of the Web seems to be cropping up everywhere. The author discusses three cases of misuse causing concern to many Web users: spamming, meta tagging, and keying advertising to searching.


Unsolicited commercial e-mail (UCE)

IEEE Antennas and Propagation Magazine, 2004

None


Group considers drastic measures to stop spam

Computer, 2003

None


Internet mail transfer and check system based on intelligence mobile agents

Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002), 2002

The Simple Mail Transfer Protocol (SMTP) based E-mail system is the most popular application in today's Internet world, but there are many dark clouds at the edge of the sunny sky. The two most well known threats are the "mail SPAM" and the "mail flooding attack". Mobile agents (MAs) are software agents that can transport themselves from a client computer ...


Research in Anti-Spam Method Based on Bayesian Filtering

2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008

The study on content-based spam filtering is one of the important topics in the Internet security research area. And Bayesian classification method has expressed better performance on anti-spam. An improved new method that classifies spam filtering based on Bayesian filtering is proposed in this paper. The experiment results show that the new method has improved spam recall and spam precision.


More Xplore Articles

Educational Resources on Unsolicited electronic mail

Back to Top

IEEE-USA E-Books

  • Web concerns [legal aspects]

    Recently, misuse of the Web seems to be cropping up everywhere. The author discusses three cases of misuse causing concern to many Web users: spamming, meta tagging, and keying advertising to searching.

  • Unsolicited commercial e-mail (UCE)

    None

  • Group considers drastic measures to stop spam

    None

  • Internet mail transfer and check system based on intelligence mobile agents

    The Simple Mail Transfer Protocol (SMTP) based E-mail system is the most popular application in today's Internet world, but there are many dark clouds at the edge of the sunny sky. The two most well known threats are the "mail SPAM" and the "mail flooding attack". Mobile agents (MAs) are software agents that can transport themselves from a client computer to various servers for remote execution. Their mobility, autonomy and distributed intelligence are very friendly to today and tomorrow's Internet computation. In this paper, we introduce a prototype of the Internet mail transfer and check system based on intelligence mobile agents. This new system model can improve the current simple mail transfer protocol model to defend the mail SPAM and the mail flooding attack. Compatible with the traditional SMTP is the most important feature of our new model. Finally, we summarize some difficulties for turning this prototype model into practical software.

  • Research in Anti-Spam Method Based on Bayesian Filtering

    The study on content-based spam filtering is one of the important topics in the Internet security research area. And Bayesian classification method has expressed better performance on anti-spam. An improved new method that classifies spam filtering based on Bayesian filtering is proposed in this paper. The experiment results show that the new method has improved spam recall and spam precision.

  • Spam Detection with Complex-Valued Neural Network Using Behavior-Based Characteristics

    The paper proposes the use of the complex-valued neural network to detect spam. The main contributions of this work are two-fold. First, we present a new model based on the CVNN for classifying personal E-mails. We changed the input of the email into 2-dimensional vector. The complex-valued neural network is superior for handling 2-dimensional vector data stream, because the input of the complex-valued neural network has real part and imaginary part. Second, the behavior-based characteristics are extracted as most important features of the E-mail. The results reveal that the proposed technology is reliable, efficient and scalable.

  • A Spam Discrimination Based on Mail Header Feature and SVM

    The traditional anti-spam techniques like black and white list can not meet the needs of the spam filter nowadays. Some machine learning techniques become very popular in the research of spam filter. Support vector machine is one of the most excellent methods in classifying. But these techniques are usually applied to spam identity based on the mail body textual content only, seldom discussing about mail header. This paper hereby proposes the spam discrimination model based on SVM, and uses SVM to sort out mail according to the feature of mail headers. By feature abstraction carried out on the mails dataset (CDSCE) with C++ program and SVM classifying. Experimental result indicates that the proposed model can effectively improve the accuracy of spam identification.

  • A Novel Online Spam Filter Based on URLs and Maximum Entropy Model

    Spam filtering is a great problem nowadays. The conventional spam filtering techniques still result in high false positives and false negatives. This paper proposes a novel online spam filter based on URLs and maximum entropy model. The filter identifies spam by classifying the e-mails with the pre- trained classifier based on the maximum entropy model and filters the spam online in terms of the characteristics of SMTP. Experimental results demonstrate it can significantly raise the filtering accuracy, effectively reduce false positives and can be applied to online processing environment by reducing the computational cost than the state-of-the-art techniques

  • Quick Fix, an expeditious approach to diminish SPAM

    In recent times e-mail is proved to be an eradicator application on Internet. Spam has traditionally been most visible threat and fashioning the major problem in the e-commerce society. Survey reports showed that the 60% of all mail messages are spam. Identifying and removal of spam from the email delivery systems allows end users to regain a useful means of communication. Spam filters offer a way to curb the problem. In this paper, we present learning based personalized anti spam filter. We discuss the architecture and present a comparative study of the proposed anti spam filtering technique. We use public and private email corpora from wide community of Internet users collected over several months for comparative study. Simulation results show that appropriate training of a personalized filter gives more adequate results than the schemas previously proposed

  • Labeling System for Countering SIP spam

    In this paper, SIP spam labeling system is proposed to detect, block or filter IP multimedia application spam over SIP network appropriately according to spam management policy of the spam recipient. In the SIP spam labeling system, a SIP message is labeled with the insertion of an agreed text meaning that the attempted session is for spam, and the label is used to identify IP application spam. The architecture of SIP spam labeling system, functions of each component, and spam detection and filtering process in SIP labeling system are described in the body.



Standards related to Unsolicited electronic mail

Back to Top

No standards are currently tagged "Unsolicited electronic mail"


Jobs related to Unsolicited electronic mail

Back to Top