Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IT-X1231 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2009-12-22 ÃÑÆäÀÌÁö 31
ÇѱÛÇ¥ÁØ¸í ½ºÆÔ Â÷´Ü¿¡ ´ëÇÑ ±â¼úÀû Àü·«
¿µ¹®Ç¥Áظí Technical strategies for countering spam
Çѱ۳»¿ë¿ä¾à º» ¹®¼­´Â ½ºÆÔÀ» Â÷´ÜÇÏ´Â ´Ù¾çÇÑ ±â¼úÀû Àü·«¿¡ ´ëÇØ ¼³¸íÇϰí ÀÖ¾î ½ºÆÔÀÇ ÀϹÝÀûÀΠƯ¡°ú ½ºÆÔ Â÷´ÜÀÇ ÁÖ¿ä ¸ñÀûÀ» Á¤ÀÇÇϰí ÀÖ´Ù. º» ¹®¼­´Â È¿°úÀûÀ¸·Î ½ºÆÔÀ» Â÷´ÜÇϱâ À§ÇÑ ÇϺα¸Á¶¸¦ Á¤ÀÇÇϴµ¥ °èÃþÀû ¸ðµ¨À» Á¤ÀÇÇϰí ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à This document describes technical strategies for countering spam which includes general characteristics of spam and main objectives for countering spam. This document gives a hierarchical model of general categories that can be targeted to establish an efficient and effective infrastructure for countering spam.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.IT-X1231_ed15.pdf TTAE.IT-X1231_ed15.pdf            

ÀÌÀü
Á¤º¸±â¼ú - °³¹æÇü ºÐ»ê ó¸® - Æ®·¹À̵ù ±â´É Á¦3ºÎ: OSI µð·ºÅ丮 ¼­ºñ½º¸¦ ÀÌ¿ëÇÑ Æ®·¹À̵ù ±â´ÉÀÇ Á¦°ø
´ÙÀ½
ÄÄÇ»ÅÍ ÀÌ¿ë ¼ÒÇÁÆ®¿þ¾î °øÇÐ(CASE) µµ±¸ äÅÃÀ» À§ÇÑ Áöħ