期刊文献+
共找到3,370篇文章
< 1 2 169 >
每页显示 20 50 100
Blockchain-Based Certificateless Bidirectional Authenticated Searchable Encryption Scheme in Cloud Email System
1
作者 Yanzhong Sun Xiaoni Du +1 位作者 Shufen Niu Xiaodong Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3287-3310,共24页
Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectio... Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectional authenticated searchable encryption model for a cloud email system named certificateless authenticated bidirectional searchable encryption(CL-BSE)by combining the storage function of cloud server with the communication function of email server.In the new model,not only can the data receiver search for the relevant content by generating its own trapdoor,but the data owner also can retrieve the content in the same way.Meanwhile,there are dual authentication functions in our model.First,during encryption,the data owner uses the private key to authenticate their identity,ensuring that only legal owner can generate the keyword ciphertext.Second,the blockchain verifies the data owner’s identity by the received ciphertext,allowing only authorized members to store their data in the server and avoiding unnecessary storage space consumption.We obtain a formal definition of CL-BSE and formulate a specific scheme from the new system model.Then the security of the scheme is analyzed based on the formalized security model.The results demonstrate that the scheme achieves multikeyword ciphertext indistinguishability andmulti-keyword trapdoor privacy against any adversary simultaneously.In addition,performance evaluation shows that the new scheme has higher computational and communication efficiency by comparing it with some existing ones. 展开更多
关键词 Cloud email system authenticated searchable encryption blockchain-based designated server test multi-trapdoor privacy multi-ciphertext indistinguishability
在线阅读 下载PDF
BUES: A Blockchain-Based Upgraded Email System
2
作者 Dawei Xu Fudong Wu +3 位作者 Liehuang Zhu Ruiguang Li Jiaqi Gao Yijie She 《China Communications》 SCIE CSCD 2022年第10期250-264,共15页
This paper focuses on the improvement of traditional email system architecture with the help of blockchain technology in the existing network environment. The improved system architecture can better improve the securi... This paper focuses on the improvement of traditional email system architecture with the help of blockchain technology in the existing network environment. The improved system architecture can better improve the security and stability of the system. The email content is extracted and stored in the blockchain network to achieve regulatory traceability between the email service provider and the higher-level organization. In turn, A Blockchain-based Upgraded Email System(BUES) is proposed. The defects of the existing traditional email system are addressed. Firstly, the threat model of the traditional email system is analyzed, and solutions are proposed for various threats. Then a system architecture consisting of the blockchain network, email servers, and users are constructed. The implementation of BUES is carried out, and the related experimental process and algorithm steps are given. After the experimental analysis, it is shown that BUES can ensure the security, reliability, efficiency, and traceability of email transmission. 展开更多
关键词 blockchain email service chaincode hyperledger fabric
在线阅读 下载PDF
电子邮件·免费·3GB!——United Email Systems
3
作者 高伟 《计算机应用文摘》 2004年第22期73-74,共2页
前一段时期.GB级别的超大容量免费邮箱充斥在各大新闻媒体的报道中,这场以Gmail为领头羊的邮箱大战终于令众多老百姓得到了不少实惠,原以为近阶段1GB的免费邮箱应该是目前最大的容量了.但是最近却出了一个3GB的免费电邮:United Ema... 前一段时期.GB级别的超大容量免费邮箱充斥在各大新闻媒体的报道中,这场以Gmail为领头羊的邮箱大战终于令众多老百姓得到了不少实惠,原以为近阶段1GB的免费邮箱应该是目前最大的容量了.但是最近却出了一个3GB的免费电邮:United Email Systems.笔者不禁心痒,立即将其注册试用一番。 展开更多
关键词 电子邮件 免费邮箱 计算机网络 UNITED email systemS
在线阅读 下载PDF
Design and Implementation of a CRM System Based on Email Services
4
作者 Mingyuan Zhu 《Journal of Computer and Communications》 2025年第2期1-15,共15页
To address the current situation where many small enterprises lack efficient management of customer data, this paper proposes a design and implementation plan of a customer relationship management (CRM) system based o... To address the current situation where many small enterprises lack efficient management of customer data, this paper proposes a design and implementation plan of a customer relationship management (CRM) system based on email service. It aims to solve the problems of data dispersion, untimely update and information redundancy in customer management of small and medium-sized enterprises. The system includes four core functional modules: historical email analysis, lead pool management, customer management and email archiving. Through email mining and web crawler technology, the system can extract potential customer information from historical emails and enrich lead data;the lead pool management module supports lead information maintenance, status tracking and conversion of high-value leads;the customer management module realizes the maintenance and dynamic tracking of customer information;the email management module provides the archiving of emails and attachments and the structured storage of basic email information. The system provides automated and intelligent customer information management, improves the work efficiency of sales staff, and provides an efficient customer relationship management solution for enterprises. 展开更多
关键词 email Mining Customer Relationship Management Lead Management Customer Dynamics email Archiving
在线阅读 下载PDF
An Online Malicious Spam Email Detection System Using Resource Allocating Network with Locality Sensitive Hashing 被引量:1
5
作者 Siti-Hajar-Aminah Ali Seiichi Ozawa +2 位作者 Junji Nakazato Tao Ban Jumpei Shimamura 《Journal of Intelligent Learning Systems and Applications》 2015年第2期42-57,共16页
In this paper, we propose a new online system that can quickly detect malicious spam emails and adapt to the changes in the email contents and the Uniform Resource Locator (URL) links leading to malicious websites by ... In this paper, we propose a new online system that can quickly detect malicious spam emails and adapt to the changes in the email contents and the Uniform Resource Locator (URL) links leading to malicious websites by updating the system daily. We introduce an autonomous function for a server to generate training examples, in which double-bounce emails are automatically collected and their class labels are given by a crawler-type software to analyze the website maliciousness called SPIKE. In general, since spammers use botnets to spread numerous malicious emails within a short time, such distributed spam emails often have the same or similar contents. Therefore, it is not necessary for all spam emails to be learned. To adapt to new malicious campaigns quickly, only new types of spam emails should be selected for learning and this can be realized by introducing an active learning scheme into a classifier model. For this purpose, we adopt Resource Allocating Network with Locality Sensitive Hashing (RAN-LSH) as a classifier model with a data selection function. In RAN-LSH, the same or similar spam emails that have already been learned are quickly searched for a hash table in Locally Sensitive Hashing (LSH), in which the matched similar emails located in “well-learned” are discarded without being used as training data. To analyze email contents, we adopt the Bag of Words (BoW) approach and generate feature vectors whose attributes are transformed based on the normalized term frequency-inverse document frequency (TF-IDF). We use a data set of double-bounce spam emails collected at National Institute of Information and Communications Technology (NICT) in Japan from March 1st, 2013 until May 10th, 2013 to evaluate the performance of the proposed system. The results confirm that the proposed spam email detection system has capability of detecting with high detection rate. 展开更多
关键词 MALICIOUS SPAM email Detection system INCREMENTAL Learning Resource Allocating Network LOCALITY Sensitive HASHING
在线阅读 下载PDF
DaC-GANSAEBF:Divide and Conquer-Generative Adversarial Network-Squeeze and Excitation-Based Framework for Spam Email Identification
6
作者 Tawfeeq Shawly Ahmed A.Alsheikhy +4 位作者 Yahia Said Shaaban M.Shaaban Husam Lahza Aws I.Abu Eid Abdulrahman Alzahrani 《Computer Modeling in Engineering & Sciences》 2025年第3期3181-3212,共32页
Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable se... Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable security risks.Current spam detection techniques often struggle to keep pace with the evolving tactics employed by spammers,resulting in user dissatisfaction and potential data breaches.To address this issue,we introduce the Divide and Conquer-Generative Adversarial Network Squeeze and Excitation-Based Framework(DaC-GANSAEBF),an innovative deep-learning model designed to identify spam emails.This framework incorporates cutting-edge technologies,such as Generative Adversarial Networks(GAN),Squeeze and Excitation(SAE)modules,and a newly formulated Light Dual Attention(LDA)mechanism,which effectively utilizes both global and local attention to discern intricate patterns within textual data.This approach significantly improves efficiency and accuracy by segmenting scanned email content into smaller,independently evaluated components.The model underwent training and validation using four publicly available benchmark datasets,achieving an impressive average accuracy of 98.87%,outperforming leading methods in the field.These findings underscore the resilience and scalability of DaC-GANSAEBF,positioning it as a viable solution for contemporary spam detection systems.The framework can be easily integrated into existing technologies to enhance user security and reduce the risks associated with spam. 展开更多
关键词 email spam fraud light dual attention squeeze and excitation divide and conquer-generative adversarial network-squeeze and excitation-based framework security
在线阅读 下载PDF
A novel email-based smart remote image surveillance camera
7
作者 LIU Xinhao MENG Lingjun +2 位作者 LIU Feng ZHOU Xiaotong WANG Jiacheng 《Journal of Measurement Science and Instrumentation》 2025年第1期128-141,共14页
Aiming at the problems of difficult deployment and access of surveillance system server,as well as high operation and maintenance cost,a remote surveillance camera is designed based on RK3566 chip,which is controlled ... Aiming at the problems of difficult deployment and access of surveillance system server,as well as high operation and maintenance cost,a remote surveillance camera is designed based on RK3566 chip,which is controlled and transmits data via email platform.Firstly,to address the impact of environmental factors such as weather and light on image quality,a deep neural network(DNN)image exposure correction network is employed to rectify images with abnormal exposure.Additionally,a back propagation(BP)neural network is utilized to fit a curve relating the brightness difference to the gamma value of images before and after exposure correction,thereby adjusting the gamma value of the camera.Secondly,to enhance the precision of YOLOv5 algorithm in differentiating between anomalies in nighttime imagery,infrared image data are employed,and a context-aware light-weight label assignment head and coordinate attention mechanism are incorporated into the model to augment the model’s detection accuracy and recall rate for small targets.Furthermore,to meet the demand for reporting of abnormal situations in unattended environments,an automatic target identification and reporting process has been designed which combines YOLOv5 algorithm with the frame-difference motion detection algorithm.The camera has been tested for compatibility with the current mainstream commercial email platforms.The mean time required for transmitting a single image file via the email platform is less than 10 s,while the mean time for transmitting a short video is less than 60 s.The BP network’s average training loss is 0.015,and the average testing loss is 0.013,which basically meets the precision requirements for gamma adjustment.The improved YOLOv5 algorithm achieved an mAP@0.5 of 91.5%and a recall rate of 85.5%,effectively enhancing the accuracy of small object detection. 展开更多
关键词 email transmission exposure correction back propagation(BP)neural network gamma value YOLOv5
在线阅读 下载PDF
托福新题型“Write an Email”的任务真实性与交际效度研究——基于语用学与体裁分析视角
8
作者 李盛 《国外英语考试教学与研究》 2025年第4期185-190,共6页
本文以托福新题型“Write an Email”为研究对象,基于任务型测试理论,探讨其在测评考生书面交际能力中的交际效度。研究引入语用学(礼貌原则、言语行为)和体裁分析(Genre Analysis)框架,系统剖析该题型对语用策略和语篇结构的考查逻辑... 本文以托福新题型“Write an Email”为研究对象,基于任务型测试理论,探讨其在测评考生书面交际能力中的交际效度。研究引入语用学(礼貌原则、言语行为)和体裁分析(Genre Analysis)框架,系统剖析该题型对语用策略和语篇结构的考查逻辑。通过对大量学生样本的系统偏误分析,归纳出语用失误和体裁偏误是学习者面临的主要挑战。研究结果为语言测试效度验证与教学实践提供参考,并提出以功能性语块习得和情境化语用意识培养为核心的分层教学框架。 展开更多
关键词 Write an email 交际效度 任务真实性 语用学 体裁分析 系统偏误分析
在线阅读 下载PDF
基于用户行为和网络拓扑的Email蠕虫传播 被引量:2
9
作者 刘衍珩 孙鑫 +2 位作者 王健 李伟平 朱建启 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2010年第6期1655-1662,共8页
通过分析用户行为规律和电子邮件网络拓扑特征,提出了能够准确描述Email蠕虫传播特性的仿真算法。首先,基于Enron Email数据集构建了能够表征Email网络特点的仿真环境,实验结果验证了仿真算法能够准确地体现Email蠕虫传播特性。然后从... 通过分析用户行为规律和电子邮件网络拓扑特征,提出了能够准确描述Email蠕虫传播特性的仿真算法。首先,基于Enron Email数据集构建了能够表征Email网络特点的仿真环境,实验结果验证了仿真算法能够准确地体现Email蠕虫传播特性。然后从理论和实验两方面分析验证了关键节点被感染后会加速蠕虫的传播的结论,并讨论了不同防护措施对蠕虫传播的抑制效果。最后建立了Email蠕虫传播数学解析模型(Topo-SIS),与仿真结果的比较表明,该模型能够较好地预测Email蠕虫的传播规模。 展开更多
关键词 计算机系统结构 email蠕虫传播仿真 网络拓扑 用户行为
在线阅读 下载PDF
基于OPNET的Email流量建模研究及仿真 被引量:3
10
作者 李波 苏锦海 张传富 《计算机应用与软件》 CSCD 2010年第7期63-64,113,共3页
网络仿真是一种全新的网络规划、设计和分析技术,它能够验证实际方案的有效性和比较多个不同的设计方案,为网络的规划设计提供可靠的定量依据。针对网络仿真中的关键问题—流量仿真与建模,对网络仿真软件OPNET的流量建模机制进行了研究... 网络仿真是一种全新的网络规划、设计和分析技术,它能够验证实际方案的有效性和比较多个不同的设计方案,为网络的规划设计提供可靠的定量依据。针对网络仿真中的关键问题—流量仿真与建模,对网络仿真软件OPNET的流量建模机制进行了研究分析,并就网络仿真中Email业务前景流量数学模型的建立做了研究,最后基于OPNET平台对仿真模型进行了仿真验证。 展开更多
关键词 网络仿真 流量建模 仿真模型 OPNET email
在线阅读 下载PDF
一个利用EMAIL实现分布数据共享的方法 被引量:2
11
作者 杨勇勤 任午令 何志均 《计算机工程与应用》 CSCD 北大核心 2000年第8期139-141,共3页
文章介绍一种利用Email实现分布数据共享的方法。文中先对该方法的几个要点进行了描述,之后介绍了该方法的设计和实现过程,最后介绍了它在好来西CIMS系统中的应用。
关键词 email 分布数据共享 企业 信息管理
在线阅读 下载PDF
利用接触跟踪机制实现Email蠕虫的检测 被引量:1
12
作者 黄智勇 曾孝平 +1 位作者 周建林 石幸利 《电子科技大学学报》 EI CAS CSCD 北大核心 2011年第3期435-439,共5页
针对Email蠕虫逐渐成为一种主要的网络威胁,提出基于接触跟踪机制检测蠕虫的方法CTCBF。该方法利用"差分熵"对单个网络节点的异常连接行为进行检测,再通过异常节点之间的连接关系利用跟踪算法建立跟踪链,当跟踪链的长度达到... 针对Email蠕虫逐渐成为一种主要的网络威胁,提出基于接触跟踪机制检测蠕虫的方法CTCBF。该方法利用"差分熵"对单个网络节点的异常连接行为进行检测,再通过异常节点之间的连接关系利用跟踪算法建立跟踪链,当跟踪链的长度达到设定阈值时,跟踪链上的可疑节点被确认为感染节点。针对阈值的不确定性,提出了一种动态阈值方法,根据不同的网络感染等级自适应调整阈值大小。仿真试验表明,该方法能够快速、准确地检测出蠕虫的传播行为,同时为未知蠕虫的检测提供了一种新的模式。 展开更多
关键词 接触跟踪链 检测 email蠕虫 仿真
在线阅读 下载PDF
Email挖掘系统的体系模型及其具体实现 被引量:1
13
作者 朱炜 王晓国 +1 位作者 黄韶坤 李启炎 《计算机辅助工程》 2004年第2期1-10,共10页
本文介绍了一种Email挖掘系统的体系模型,阐述了此模型的各个模块所涉及的相关算法和技术,着重论述了标准词库建立、文本内容分析和Email信息聚类等的具体方法,并通过一个实例详细论述了Email挖掘的应用过程。
关键词 email挖掘系统 体系模型 电子邮件 标准词库 文本内容 信息聚类
在线阅读 下载PDF
利用设计模式进行Email系统的设计 被引量:1
14
作者 郑琪 方思行 《暨南大学学报(自然科学与医学版)》 CAS CSCD 2003年第3期35-41,共7页
 简单介绍了设计模式的概念和ErichGamma归纳的一些基本的面向对象软件设计模式.根据Email系统的特点,将这些模式应用到系统的整体设计中,使得系统结构清晰协调,保证了系统的稳定性和可扩充性.
关键词 设计模式 系统复用 邮件系统
在线阅读 下载PDF
论email在英语写作教学中的辅助作用 被引量:6
15
作者 张冬梅 赵凤玲 《安阳师范学院学报》 2003年第6期72-74,共3页
本文分析了学生在英语写作方面所存在的问题,依据现代写作理论,对email辅助英语写作教学进行了探讨。Email辅助写作教学活动不仅激发了学生的写作积极性,提高了学生的写作能力,而且扩大了学生的知识面,提高了学生的跨文化交际能力。
关键词 email 英语写作 交际能力
在线阅读 下载PDF
一种基于SVM和领域综合特征的Email自动分类方法 被引量:1
16
作者 耿焕同 蔡庆生 《计算机科学》 CSCD 北大核心 2006年第6期52-54,57,共4页
Email自动分类已成为半结构化文本信息自动处理的研究热点。本文在对已有Email自动分类方法深入研究的基础上,提出了一种基于SVM和领域综合特征的Email自动分类方法。主要包括一是将SVM引入到Email自动分类研究中,并对SVM学习算法中的... Email自动分类已成为半结构化文本信息自动处理的研究热点。本文在对已有Email自动分类方法深入研究的基础上,提出了一种基于SVM和领域综合特征的Email自动分类方法。主要包括一是将SVM引入到Email自动分类研究中,并对SVM学习算法中的核函数和参数选择进行了探讨;二是鉴于词频的特征表示方法难以准确表示Email主要内容,因此将领域知识引入Email特征表示中,并在此基础上提出了一种综合领域知识和词频的特征表示方法,用于Email分类。该方法是在词频特征的基础上加入人工总结出的领域特征,从而更能准确地表示Email的主要内容,以提高Email分类的平均F-score。通过实验,验证了基于SVM和领域综合特征的Email自动分类方法能有效地提高Email自动分类处理的准确性。 展开更多
关键词 email自动分类 支持向量机 领域综合特征
在线阅读 下载PDF
一个基于Email的数据交换模型 被引量:1
17
作者 崔学荣 李娟 《微型机与应用》 北大核心 2005年第11期32-34,共3页
提出一种具有平台独立性的基于Email的5层数据交换模型,以实现在异构的网络、操作系统和数据库管理系统之间交换数据。分析了该模型的工作原理和使用环境,分层设计并实现了该模型,最后给出了具体应用实例。
关键词 email 数据交换 防火墙 SMTP POP3 数据交换模型 数据库管理系统 交换数据 操作系统 使用环境
在线阅读 下载PDF
Email与现代英语教学 被引量:2
18
作者 林明金 《集美大学学报(教育科学版)》 2004年第3期84-87,共4页
网络英语与标准英语有很大的差别。从Email的文体特征入手着重探讨Email与现代英语教学的 关系。
关键词 email 文体特征 英语教学
在线阅读 下载PDF
Email收发不畅的若干原因 被引量:1
19
作者 雷枫 陆红滨 曹雨生 《微型机与应用》 2003年第1期26-28,共3页
Internetmail的架构及运作原理,从其中的各个环节分析了Email收发可能遇到的故障,并提出了解决办法。
关键词 email 计算机网络 电子邮件系统 可靠性 存储转发 邮件病毒 企业网 Internet
在线阅读 下载PDF
用Email访问Internet信息资源 被引量:2
20
作者 沈艺 《情报探索》 2000年第2期27-28,共2页
介绍了通过Email获取Internet上多种信息资源(如专业数据库、Web、FTP、Gopher、Archie等)的方法,并给出操作步骤。
关键词 email INTERNET 因特网 检索 信息资源
在线阅读 下载PDF
上一页 1 2 169 下一页 到第
使用帮助 返回顶部