Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IT-X1231 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2009-12-22 ÃÑÆäÀÌÁö 31
ÇѱÛÇ¥ÁØ¸í ½ºÆÔ Â÷´Ü¿¡ ´ëÇÑ ±â¼úÀû Àü·«
¿µ¹®Ç¥Áظí Technical strategies for countering spam
Çѱ۳»¿ë¿ä¾à º» ¹®¼­´Â ½ºÆÔÀ» Â÷´ÜÇÏ´Â ´Ù¾çÇÑ ±â¼úÀû Àü·«¿¡ ´ëÇØ ¼³¸íÇÏ°í ÀÖ¾î ½ºÆÔÀÇ ÀϹÝÀûÀΠƯ¡°ú ½ºÆÔ Â÷´ÜÀÇ ÁÖ¿ä ¸ñÀûÀ» Á¤ÀÇÇÏ°í ÀÖ´Ù. º» ¹®¼­´Â È¿°úÀûÀ¸·Î ½ºÆÔÀ» Â÷´ÜÇϱâ À§ÇÑ ÇϺα¸Á¶¸¦ Á¤ÀÇÇϴµ¥ °èÃþÀû ¸ðµ¨À» Á¤ÀÇÇÏ°í ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à This document describes technical strategies for countering spam which includes general characteristics of spam and main objectives for countering spam. This document gives a hierarchical model of general categories that can be targeted to establish an efficient and effective infrastructure for countering spam.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.IT-X1231_ed15.pdf TTAE.IT-X1231_ed15.pdf            

ÀÌÀü
´ÙÁß ºÐ»ê ½Å¿ø °ü¸® ¼­ºñ½º¸¦ À§ÇÑ »óÈ£¿¬µ¿ ÇÁ·¹ÀÓ¿öÅ© - Á¦4ºÎ: ÀÚ°ÝÁ¤º¸ ¾ç½Ä º¯È¯
´ÙÀ½
¼ÒÇÁÆ®¿þ¾î ÆÐÄ¡ °ü¸®¸¦ À§ÇÑ ¿ä±¸»çÇ×°ú ÀýÂ÷