• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 122
  • 11
  • 7
  • 4
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 176
  • 176
  • 98
  • 49
  • 41
  • 38
  • 38
  • 27
  • 22
  • 21
  • 20
  • 20
  • 16
  • 16
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

An investigation into some critical computer networking parameters : Internet addressing and routing

Isted, Edwin David January 1996 (has links)
This thesis describes the evaluation of several proposals suggested as replacements for the currenT Internet's TCPJIP protocol suite. The emphasis of this thesis is on how the proposals solve the current routing and addressing problems associated with the Internet. The addressing problem is found to be related to address space depletion, and the routing problem related to excessive routing costs. The evaluation is performed based on criteria selected for their applicability as future Internet design criteria. AIl the protocols are evaluated using the above-mentioned criteria. It is concluded that the most suitable addressing mechanism is an expandable multi-level format, with a logical separation of location and host identification information. Similarly, the most suitable network representation technique is found to be an unrestricted hierarchical structure which uses a suitable abstraction mechanism. It is further found that these two solutions could adequately solve the existing addressing and routing problems and allow substantial growth of the Internet.
52

A study on combating the problem of unsolicited electronic messages inHong Kong

Cheung, Pak-to, Patrick., 張伯陶. January 2007 (has links)
published_or_final_version / abstract / Public Administration / Master / Master of Public Administration
53

Unique Channel Email System

Balakchiev, Milko 08 1900 (has links)
Email connects 85% of the world. This paper explores the pattern of information overload encountered by majority of email users and examine what steps key email providers are taking to combat the problem. Besides fighting spam, popular email providers offer very limited tools to reduce the amount of unwanted incoming email. Rather, there has been a trend to expand storage space and aid the organization of email. Storing email is very costly and harmful to the environment. Additionally, information overload can be detrimental to productivity. We propose a simple solution that results in drastic reduction of unwanted mail, also known as graymail.
54

Mitigating spam using network-level features

Ramachandran, Anirudh Vadakkedath 04 August 2011 (has links)
Spam is an increasing menace in email: 90% of email is spam, and over 90% of spam is sent by botnets---networks of compromised computers under the control of miscreants. In this dissertation, we introduce email spam filtering using network-level features of spammers. Network-level features are based on lightweight measurements that can be made in the network, often without processing or storing a message. These features stay relevant for longer periods, are harder for criminals to alter at will (e.g., a bot cannot act independently of other bots in the botnet), and afford the unique opportunity to observe the coordinated behavior of spammers. We find that widely-used IP address-based reputation systems (e.g., IP blacklists) cannot keep up with the threats of spam from previously unseen IP addresses, and from new and stealthy attacks---to thwart IP-based reputation systems, spammers are reconnoitering IP Blacklists and sending spam from hijacked IP address space. Finally, spammers are "gaming" collaborative filtering by users in Web-based email by casting fraudulent "Not Spam" votes on spam email. We present three systems that detect each attack that uses spammer behavior rather than their IP address. First, we present IP blacklist counter-intelligence, a system that can passively enumerate spammers performing IP blacklist reconnaissance. Second, we present SpamTracker, a system that distinguishes spammers from legitimate senders by applying clustering on the set of domains to which email is sent. Third, we analyze vote-gaming attacks in large Web-based email systems that pollutes user feedback on spam emails, and present an efficient clustering-based method to mitigate such attacks.
55

E-Mail privacy : does the government have the right to intercept and or monitor private e-mail communications?

Majola, Zanele Precious. January 2003 (has links)
Section 14 of the Constitution provides for the right to privacy, which includes the right not to have the privacy of communications infringed. The right is also protected at common law - a breach of a person's privacy constitutes an iniura. E-mail communications are therefore protected by both, the common law and the Constitution. The question that this work seeks to answer is, whether the Government has the right to intercept and/or monitor private e-mail communications. The right to privacy is not absolute, case law and legislation show that this right can be limited. At common law, a valid defence will negate the unlawfulness of the invasion. In terms of the Constitution, the right to privacy can only be limited in accordance with the limitation clause section 36. For each case, courts will have to balance, the government's interest in combating crime and that of the citizen to the privacy of their e-mail communications. In seeking to answer the question, this work considers the protection afforded by the common law and the Constitution. It also considers statutes which limit the right to privacy, including whether these statutes are applicable to e-mail communications and if they are, whether they constitute a justifiable limitation of the right, for example: the Regulation of Interception of Communications and Provision of Communication-Related Information Act and the Criminal Procedure Act - which was enacted when the 'cyber-world' was non-existent. All statutes, applicable to e-mail communications, provide for some form of requirements or guidelines before communications can be intercepted or/ and monitored. The right to privacy is also protected in foreign jurisdictions and is not absolute. There is protection only against unreasonable invasions of privacy. In conclusion, both statutory law and common law permit the government, within limitations, to intercept or/ and monitor private e-mail communications. Where there are guidelines, regulating this power, the circumstance under which and when it can be exercised. This will amount to a reasonable and justifiable limitation and therefore the right will not be violated. / Thesis (LL.M.)-University of Natal, Durban, 2003.
56

A spam-detecting artificial immune system /

Oda, Terri January 1900 (has links)
Thesis (M.C.S.)--Carleton University, 2005. / Includes bibliographical references (p. 115-123). Also available in electronic format on the Internet.
57

Transactional behaviour based spam detection /

Choi, Thomas, January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2007. / Includes bibliographical references (p. 119-126). Also available in electronic format on the Internet.
58

A dimensional category-based email management system /

Lu, Peng. January 1900 (has links)
Thesis (M.C.S.) - Carleton University, 2007. / Includes bibliographical references (p. 87-90). Also available in electronic format on the Internet.
59

E-mail spam filtering solution for the Western Interstate Commission for Higher Education (WICHE)

Worley, Jerry A. January 2005 (has links) (PDF)
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2005. / Title from PDF title page (viewed Nov. 23, 2005). Includes bibliographical references.
60

E-mail forensic authorship attribution

Lalla, Himal January 2010 (has links)
E-mails have become the standard for business as well as personal communication. The inherent security risks within e-mail communication present the problem of anonymity. If an author of an e-mail is not known, the digital forensic investigator needs to determine the authorship of the e-mail using a process that has not been standardised in the e-mail forensic field. This research project examines many problems associated with e-mail communication and the digital forensic domain; more specifically e-mail forensic investigations, and the recovery of legally admissible evidence to be presented in a court of law. The Research Methodology utilised a comprehensive literature review in combination with Design Science which results in the development of an artifact through intensive research. The Proposed E-Mail Forensic Methodology is based on the most current digital forensic investigation process and further validation of the process was established via expert reviews. The opinions of the digital forensic experts were an integral portion of the validation process which adds to the credibility of the study. This was performed through the aid of the Delphi technique. This Proposed E-Mail Forensic Methodology adopts a standardised investigation process applied to an e-mail investigation and takes into account the South African perspective by incorporating various checks with the laws and legislation. By following the Proposed E-mail Forensic Methodology, e-mail forensic investigators can produce evidence that is legally admissible in a court of law.

Page generated in 0.0851 seconds