期刊文献+
共找到3,371篇文章
< 1 2 169 >
每页显示 20 50 100
Blockchain-Based Certificateless Bidirectional Authenticated Searchable Encryption Scheme in Cloud Email System
1
作者 Yanzhong Sun Xiaoni Du +1 位作者 Shufen Niu Xiaodong Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3287-3310,共24页
Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectio... Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectional authenticated searchable encryption model for a cloud email system named certificateless authenticated bidirectional searchable encryption(CL-BSE)by combining the storage function of cloud server with the communication function of email server.In the new model,not only can the data receiver search for the relevant content by generating its own trapdoor,but the data owner also can retrieve the content in the same way.Meanwhile,there are dual authentication functions in our model.First,during encryption,the data owner uses the private key to authenticate their identity,ensuring that only legal owner can generate the keyword ciphertext.Second,the blockchain verifies the data owner’s identity by the received ciphertext,allowing only authorized members to store their data in the server and avoiding unnecessary storage space consumption.We obtain a formal definition of CL-BSE and formulate a specific scheme from the new system model.Then the security of the scheme is analyzed based on the formalized security model.The results demonstrate that the scheme achieves multikeyword ciphertext indistinguishability andmulti-keyword trapdoor privacy against any adversary simultaneously.In addition,performance evaluation shows that the new scheme has higher computational and communication efficiency by comparing it with some existing ones. 展开更多
关键词 Cloud email system authenticated searchable encryption blockchain-based designated server test multi-trapdoor privacy multi-ciphertext indistinguishability
在线阅读 下载PDF
BUES: A Blockchain-Based Upgraded Email System
2
作者 Dawei Xu Fudong Wu +3 位作者 Liehuang Zhu Ruiguang Li Jiaqi Gao Yijie She 《China Communications》 SCIE CSCD 2022年第10期250-264,共15页
This paper focuses on the improvement of traditional email system architecture with the help of blockchain technology in the existing network environment. The improved system architecture can better improve the securi... This paper focuses on the improvement of traditional email system architecture with the help of blockchain technology in the existing network environment. The improved system architecture can better improve the security and stability of the system. The email content is extracted and stored in the blockchain network to achieve regulatory traceability between the email service provider and the higher-level organization. In turn, A Blockchain-based Upgraded Email System(BUES) is proposed. The defects of the existing traditional email system are addressed. Firstly, the threat model of the traditional email system is analyzed, and solutions are proposed for various threats. Then a system architecture consisting of the blockchain network, email servers, and users are constructed. The implementation of BUES is carried out, and the related experimental process and algorithm steps are given. After the experimental analysis, it is shown that BUES can ensure the security, reliability, efficiency, and traceability of email transmission. 展开更多
关键词 blockchain email service chaincode hyperledger fabric
在线阅读 下载PDF
电子邮件·免费·3GB!——United Email Systems
3
作者 高伟 《计算机应用文摘》 2004年第22期73-74,共2页
前一段时期.GB级别的超大容量免费邮箱充斥在各大新闻媒体的报道中,这场以Gmail为领头羊的邮箱大战终于令众多老百姓得到了不少实惠,原以为近阶段1GB的免费邮箱应该是目前最大的容量了.但是最近却出了一个3GB的免费电邮:United Ema... 前一段时期.GB级别的超大容量免费邮箱充斥在各大新闻媒体的报道中,这场以Gmail为领头羊的邮箱大战终于令众多老百姓得到了不少实惠,原以为近阶段1GB的免费邮箱应该是目前最大的容量了.但是最近却出了一个3GB的免费电邮:United Email Systems.笔者不禁心痒,立即将其注册试用一番。 展开更多
关键词 电子邮件 免费邮箱 计算机网络 UNITED email systemS
在线阅读 下载PDF
Design and Implementation of a CRM System Based on Email Services
4
作者 Mingyuan Zhu 《Journal of Computer and Communications》 2025年第2期1-15,共15页
To address the current situation where many small enterprises lack efficient management of customer data, this paper proposes a design and implementation plan of a customer relationship management (CRM) system based o... To address the current situation where many small enterprises lack efficient management of customer data, this paper proposes a design and implementation plan of a customer relationship management (CRM) system based on email service. It aims to solve the problems of data dispersion, untimely update and information redundancy in customer management of small and medium-sized enterprises. The system includes four core functional modules: historical email analysis, lead pool management, customer management and email archiving. Through email mining and web crawler technology, the system can extract potential customer information from historical emails and enrich lead data;the lead pool management module supports lead information maintenance, status tracking and conversion of high-value leads;the customer management module realizes the maintenance and dynamic tracking of customer information;the email management module provides the archiving of emails and attachments and the structured storage of basic email information. The system provides automated and intelligent customer information management, improves the work efficiency of sales staff, and provides an efficient customer relationship management solution for enterprises. 展开更多
关键词 email Mining Customer Relationship Management Lead Management Customer Dynamics email Archiving
在线阅读 下载PDF
A novel email-based smart remote image surveillance camera
5
作者 LIU Xinhao MENG Lingjun +2 位作者 LIU Feng ZHOU Xiaotong WANG Jiacheng 《Journal of Measurement Science and Instrumentation》 2025年第1期128-141,共14页
Aiming at the problems of difficult deployment and access of surveillance system server,as well as high operation and maintenance cost,a remote surveillance camera is designed based on RK3566 chip,which is controlled ... Aiming at the problems of difficult deployment and access of surveillance system server,as well as high operation and maintenance cost,a remote surveillance camera is designed based on RK3566 chip,which is controlled and transmits data via email platform.Firstly,to address the impact of environmental factors such as weather and light on image quality,a deep neural network(DNN)image exposure correction network is employed to rectify images with abnormal exposure.Additionally,a back propagation(BP)neural network is utilized to fit a curve relating the brightness difference to the gamma value of images before and after exposure correction,thereby adjusting the gamma value of the camera.Secondly,to enhance the precision of YOLOv5 algorithm in differentiating between anomalies in nighttime imagery,infrared image data are employed,and a context-aware light-weight label assignment head and coordinate attention mechanism are incorporated into the model to augment the model’s detection accuracy and recall rate for small targets.Furthermore,to meet the demand for reporting of abnormal situations in unattended environments,an automatic target identification and reporting process has been designed which combines YOLOv5 algorithm with the frame-difference motion detection algorithm.The camera has been tested for compatibility with the current mainstream commercial email platforms.The mean time required for transmitting a single image file via the email platform is less than 10 s,while the mean time for transmitting a short video is less than 60 s.The BP network’s average training loss is 0.015,and the average testing loss is 0.013,which basically meets the precision requirements for gamma adjustment.The improved YOLOv5 algorithm achieved an mAP@0.5 of 91.5%and a recall rate of 85.5%,effectively enhancing the accuracy of small object detection. 展开更多
关键词 email transmission exposure correction back propagation(BP)neural network gamma value YOLOv5
在线阅读 下载PDF
DaC-GANSAEBF:Divide and Conquer-Generative Adversarial Network-Squeeze and Excitation-Based Framework for Spam Email Identification
6
作者 Tawfeeq Shawly Ahmed A.Alsheikhy +4 位作者 Yahia Said Shaaban M.Shaaban Husam Lahza Aws I.Abu Eid Abdulrahman Alzahrani 《Computer Modeling in Engineering & Sciences》 2025年第3期3181-3212,共32页
Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable se... Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable security risks.Current spam detection techniques often struggle to keep pace with the evolving tactics employed by spammers,resulting in user dissatisfaction and potential data breaches.To address this issue,we introduce the Divide and Conquer-Generative Adversarial Network Squeeze and Excitation-Based Framework(DaC-GANSAEBF),an innovative deep-learning model designed to identify spam emails.This framework incorporates cutting-edge technologies,such as Generative Adversarial Networks(GAN),Squeeze and Excitation(SAE)modules,and a newly formulated Light Dual Attention(LDA)mechanism,which effectively utilizes both global and local attention to discern intricate patterns within textual data.This approach significantly improves efficiency and accuracy by segmenting scanned email content into smaller,independently evaluated components.The model underwent training and validation using four publicly available benchmark datasets,achieving an impressive average accuracy of 98.87%,outperforming leading methods in the field.These findings underscore the resilience and scalability of DaC-GANSAEBF,positioning it as a viable solution for contemporary spam detection systems.The framework can be easily integrated into existing technologies to enhance user security and reduce the risks associated with spam. 展开更多
关键词 email spam fraud light dual attention squeeze and excitation divide and conquer-generative adversarial network-squeeze and excitation-based framework security
在线阅读 下载PDF
An Online Malicious Spam Email Detection System Using Resource Allocating Network with Locality Sensitive Hashing 被引量:1
7
作者 Siti-Hajar-Aminah Ali Seiichi Ozawa +2 位作者 Junji Nakazato Tao Ban Jumpei Shimamura 《Journal of Intelligent Learning Systems and Applications》 2015年第2期42-57,共16页
In this paper, we propose a new online system that can quickly detect malicious spam emails and adapt to the changes in the email contents and the Uniform Resource Locator (URL) links leading to malicious websites by ... In this paper, we propose a new online system that can quickly detect malicious spam emails and adapt to the changes in the email contents and the Uniform Resource Locator (URL) links leading to malicious websites by updating the system daily. We introduce an autonomous function for a server to generate training examples, in which double-bounce emails are automatically collected and their class labels are given by a crawler-type software to analyze the website maliciousness called SPIKE. In general, since spammers use botnets to spread numerous malicious emails within a short time, such distributed spam emails often have the same or similar contents. Therefore, it is not necessary for all spam emails to be learned. To adapt to new malicious campaigns quickly, only new types of spam emails should be selected for learning and this can be realized by introducing an active learning scheme into a classifier model. For this purpose, we adopt Resource Allocating Network with Locality Sensitive Hashing (RAN-LSH) as a classifier model with a data selection function. In RAN-LSH, the same or similar spam emails that have already been learned are quickly searched for a hash table in Locally Sensitive Hashing (LSH), in which the matched similar emails located in “well-learned” are discarded without being used as training data. To analyze email contents, we adopt the Bag of Words (BoW) approach and generate feature vectors whose attributes are transformed based on the normalized term frequency-inverse document frequency (TF-IDF). We use a data set of double-bounce spam emails collected at National Institute of Information and Communications Technology (NICT) in Japan from March 1st, 2013 until May 10th, 2013 to evaluate the performance of the proposed system. The results confirm that the proposed spam email detection system has capability of detecting with high detection rate. 展开更多
关键词 MALICIOUS SPAM email Detection system INCREMENTAL Learning Resource Allocating Network LOCALITY Sensitive HASHING
在线阅读 下载PDF
Advanced BERT and CNN-Based Computational Model for Phishing Detection in Enterprise Systems
8
作者 Brij B.Gupta Akshat Gaurav +4 位作者 Varsha Arya Razaz Waheeb Attar Shavi Bansal Ahmed Alhomoud Kwok Tai Chui 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第12期2165-2183,共19页
Phishing attacks present a serious threat to enterprise systems,requiring advanced detection techniques to protect sensitive data.This study introduces a phishing email detection framework that combines Bidirectional ... Phishing attacks present a serious threat to enterprise systems,requiring advanced detection techniques to protect sensitive data.This study introduces a phishing email detection framework that combines Bidirectional Encoder Representations from Transformers(BERT)for feature extraction and CNN for classification,specifically designed for enterprise information systems.BERT’s linguistic capabilities are used to extract key features from email content,which are then processed by a convolutional neural network(CNN)model optimized for phishing detection.Achieving an accuracy of 97.5%,our proposed model demonstrates strong proficiency in identifying phishing emails.This approach represents a significant advancement in applying deep learning to cybersecurity,setting a new benchmark for email security by effectively addressing the increasing complexity of phishing attacks. 展开更多
关键词 PHISHING BERT convolutional neural networks email security deep learning
在线阅读 下载PDF
Comparative Analysis of Machine Learning Algorithms for Email Phishing Detection Using TF-IDF, Word2Vec, and BERT
9
作者 Arar Al Tawil Laiali Almazaydeh +3 位作者 Doaa Qawasmeh Baraah Qawasmeh Mohammad Alshinwan Khaled Elleithy 《Computers, Materials & Continua》 SCIE EI 2024年第11期3395-3412,共18页
Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information,a practice known as phishing.This study utilizes three distinct methodologies,Te... Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information,a practice known as phishing.This study utilizes three distinct methodologies,Term Frequency-Inverse Document Frequency,Word2Vec,and Bidirectional Encoder Representations from Transform-ers,to evaluate the effectiveness of various machine learning algorithms in detecting phishing attacks.The study uses feature extraction methods to assess the performance of Logistic Regression,Decision Tree,Random Forest,and Multilayer Perceptron algorithms.The best results for each classifier using Term Frequency-Inverse Document Frequency were Multilayer Perceptron(Precision:0.98,Recall:0.98,F1-score:0.98,Accuracy:0.98).Word2Vec’s best results were Multilayer Perceptron(Precision:0.98,Recall:0.98,F1-score:0.98,Accuracy:0.98).The highest performance was achieved using the Bidirectional Encoder Representations from the Transformers model,with Precision,Recall,F1-score,and Accuracy all reaching 0.99.This study highlights how advanced pre-trained models,such as Bidirectional Encoder Representations from Transformers,can significantly enhance the accuracy and reliability of fraud detection systems. 展开更多
关键词 ATTACKS email phishing machine learning security representations from transformers(BERT) text classifeir natural language processing(NLP)
在线阅读 下载PDF
基于Django的高校电子邮件发送系统设计与实现
10
作者 刘忠杰 蔡佳琛 徐美芳 《常州信息职业技术学院学报》 2025年第4期29-36,共8页
随着高等教育信息化进程的加速,电子邮件已成为高校教学与管理的重要通信载体。然而,现有邮件系统普遍存在权限管理粗放、群发效率低下的问题,导致信息传递时效性差、行政资源重复消耗。设计基于Django的高校电子邮件发送系统,采用基于... 随着高等教育信息化进程的加速,电子邮件已成为高校教学与管理的重要通信载体。然而,现有邮件系统普遍存在权限管理粗放、群发效率低下的问题,导致信息传递时效性差、行政资源重复消耗。设计基于Django的高校电子邮件发送系统,采用基于角色的访问控制(RBAC)模型,构建学校、学院、班级三级权限控制架构,实现信息精细化定向管控分发机制,支持按班级、个人及预设分组批量发送邮件,为教师提供高效、便捷的群发管理平台。针对高并发场景,邮件推送功能采用Celery异步任务队列架构,将耗时的邮件推送过程异步化处理,有效消除同步操作对用户请求的阻塞,显著提升了前端界面操作的流畅性。研究表明,RBAC权限模型与Celery异步架构的协同应用,优化了用户体验,增强了系统的可扩展性,为高校教育信息化建设中高并发、高性能需求提供了可供借鉴的技术解决方案。 展开更多
关键词 Django框架 电子邮件系统 邮件推送 RBAC模型 教育信息化
在线阅读 下载PDF
基于用户行为和网络拓扑的Email蠕虫传播 被引量:2
11
作者 刘衍珩 孙鑫 +2 位作者 王健 李伟平 朱建启 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2010年第6期1655-1662,共8页
通过分析用户行为规律和电子邮件网络拓扑特征,提出了能够准确描述Email蠕虫传播特性的仿真算法。首先,基于Enron Email数据集构建了能够表征Email网络特点的仿真环境,实验结果验证了仿真算法能够准确地体现Email蠕虫传播特性。然后从... 通过分析用户行为规律和电子邮件网络拓扑特征,提出了能够准确描述Email蠕虫传播特性的仿真算法。首先,基于Enron Email数据集构建了能够表征Email网络特点的仿真环境,实验结果验证了仿真算法能够准确地体现Email蠕虫传播特性。然后从理论和实验两方面分析验证了关键节点被感染后会加速蠕虫的传播的结论,并讨论了不同防护措施对蠕虫传播的抑制效果。最后建立了Email蠕虫传播数学解析模型(Topo-SIS),与仿真结果的比较表明,该模型能够较好地预测Email蠕虫的传播规模。 展开更多
关键词 计算机系统结构 email蠕虫传播仿真 网络拓扑 用户行为
在线阅读 下载PDF
基于OPNET的Email流量建模研究及仿真 被引量:3
12
作者 李波 苏锦海 张传富 《计算机应用与软件》 CSCD 2010年第7期63-64,113,共3页
网络仿真是一种全新的网络规划、设计和分析技术,它能够验证实际方案的有效性和比较多个不同的设计方案,为网络的规划设计提供可靠的定量依据。针对网络仿真中的关键问题—流量仿真与建模,对网络仿真软件OPNET的流量建模机制进行了研究... 网络仿真是一种全新的网络规划、设计和分析技术,它能够验证实际方案的有效性和比较多个不同的设计方案,为网络的规划设计提供可靠的定量依据。针对网络仿真中的关键问题—流量仿真与建模,对网络仿真软件OPNET的流量建模机制进行了研究分析,并就网络仿真中Email业务前景流量数学模型的建立做了研究,最后基于OPNET平台对仿真模型进行了仿真验证。 展开更多
关键词 网络仿真 流量建模 仿真模型 OPNET email
在线阅读 下载PDF
一个利用EMAIL实现分布数据共享的方法 被引量:2
13
作者 杨勇勤 任午令 何志均 《计算机工程与应用》 CSCD 北大核心 2000年第8期139-141,共3页
文章介绍一种利用Email实现分布数据共享的方法。文中先对该方法的几个要点进行了描述,之后介绍了该方法的设计和实现过程,最后介绍了它在好来西CIMS系统中的应用。
关键词 email 分布数据共享 企业 信息管理
在线阅读 下载PDF
利用接触跟踪机制实现Email蠕虫的检测 被引量:1
14
作者 黄智勇 曾孝平 +1 位作者 周建林 石幸利 《电子科技大学学报》 EI CAS CSCD 北大核心 2011年第3期435-439,共5页
针对Email蠕虫逐渐成为一种主要的网络威胁,提出基于接触跟踪机制检测蠕虫的方法CTCBF。该方法利用"差分熵"对单个网络节点的异常连接行为进行检测,再通过异常节点之间的连接关系利用跟踪算法建立跟踪链,当跟踪链的长度达到... 针对Email蠕虫逐渐成为一种主要的网络威胁,提出基于接触跟踪机制检测蠕虫的方法CTCBF。该方法利用"差分熵"对单个网络节点的异常连接行为进行检测,再通过异常节点之间的连接关系利用跟踪算法建立跟踪链,当跟踪链的长度达到设定阈值时,跟踪链上的可疑节点被确认为感染节点。针对阈值的不确定性,提出了一种动态阈值方法,根据不同的网络感染等级自适应调整阈值大小。仿真试验表明,该方法能够快速、准确地检测出蠕虫的传播行为,同时为未知蠕虫的检测提供了一种新的模式。 展开更多
关键词 接触跟踪链 检测 email蠕虫 仿真
在线阅读 下载PDF
Email挖掘系统的体系模型及其具体实现 被引量:1
15
作者 朱炜 王晓国 +1 位作者 黄韶坤 李启炎 《计算机辅助工程》 2004年第2期1-10,共10页
本文介绍了一种Email挖掘系统的体系模型,阐述了此模型的各个模块所涉及的相关算法和技术,着重论述了标准词库建立、文本内容分析和Email信息聚类等的具体方法,并通过一个实例详细论述了Email挖掘的应用过程。
关键词 email挖掘系统 体系模型 电子邮件 标准词库 文本内容 信息聚类
在线阅读 下载PDF
利用设计模式进行Email系统的设计 被引量:1
16
作者 郑琪 方思行 《暨南大学学报(自然科学与医学版)》 CAS CSCD 2003年第3期35-41,共7页
 简单介绍了设计模式的概念和ErichGamma归纳的一些基本的面向对象软件设计模式.根据Email系统的特点,将这些模式应用到系统的整体设计中,使得系统结构清晰协调,保证了系统的稳定性和可扩充性.
关键词 设计模式 系统复用 邮件系统
在线阅读 下载PDF
论email在英语写作教学中的辅助作用 被引量:6
17
作者 张冬梅 赵凤玲 《安阳师范学院学报》 2003年第6期72-74,共3页
本文分析了学生在英语写作方面所存在的问题,依据现代写作理论,对email辅助英语写作教学进行了探讨。Email辅助写作教学活动不仅激发了学生的写作积极性,提高了学生的写作能力,而且扩大了学生的知识面,提高了学生的跨文化交际能力。
关键词 email 英语写作 交际能力
在线阅读 下载PDF
一种基于SVM和领域综合特征的Email自动分类方法 被引量:1
18
作者 耿焕同 蔡庆生 《计算机科学》 CSCD 北大核心 2006年第6期52-54,57,共4页
Email自动分类已成为半结构化文本信息自动处理的研究热点。本文在对已有Email自动分类方法深入研究的基础上,提出了一种基于SVM和领域综合特征的Email自动分类方法。主要包括一是将SVM引入到Email自动分类研究中,并对SVM学习算法中的... Email自动分类已成为半结构化文本信息自动处理的研究热点。本文在对已有Email自动分类方法深入研究的基础上,提出了一种基于SVM和领域综合特征的Email自动分类方法。主要包括一是将SVM引入到Email自动分类研究中,并对SVM学习算法中的核函数和参数选择进行了探讨;二是鉴于词频的特征表示方法难以准确表示Email主要内容,因此将领域知识引入Email特征表示中,并在此基础上提出了一种综合领域知识和词频的特征表示方法,用于Email分类。该方法是在词频特征的基础上加入人工总结出的领域特征,从而更能准确地表示Email的主要内容,以提高Email分类的平均F-score。通过实验,验证了基于SVM和领域综合特征的Email自动分类方法能有效地提高Email自动分类处理的准确性。 展开更多
关键词 email自动分类 支持向量机 领域综合特征
在线阅读 下载PDF
一个基于Email的数据交换模型 被引量:1
19
作者 崔学荣 李娟 《微型机与应用》 北大核心 2005年第11期32-34,共3页
提出一种具有平台独立性的基于Email的5层数据交换模型,以实现在异构的网络、操作系统和数据库管理系统之间交换数据。分析了该模型的工作原理和使用环境,分层设计并实现了该模型,最后给出了具体应用实例。
关键词 email 数据交换 防火墙 SMTP POP3 数据交换模型 数据库管理系统 交换数据 操作系统 使用环境
在线阅读 下载PDF
Email与现代英语教学 被引量:2
20
作者 林明金 《集美大学学报(教育科学版)》 2004年第3期84-87,共4页
网络英语与标准英语有很大的差别。从Email的文体特征入手着重探讨Email与现代英语教学的 关系。
关键词 email 文体特征 英语教学
在线阅读 下载PDF
上一页 1 2 169 下一页 到第
使用帮助 返回顶部