Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IT-X1231 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2009-12-22 ÃÑÆäÀÌÁö 31
ÇѱÛÇ¥ÁØ¸í ½ºÆÔ Â÷´Ü¿¡ ´ëÇÑ ±â¼úÀû Àü·«
¿µ¹®Ç¥Áظí Technical strategies for countering spam
Çѱ۳»¿ë¿ä¾à º» ¹®¼­´Â ½ºÆÔÀ» Â÷´ÜÇÏ´Â ´Ù¾çÇÑ ±â¼úÀû Àü·«¿¡ ´ëÇØ ¼³¸íÇÏ°í ÀÖ¾î ½ºÆÔÀÇ ÀϹÝÀûÀΠƯ¡°ú ½ºÆÔ Â÷´ÜÀÇ ÁÖ¿ä ¸ñÀûÀ» Á¤ÀÇÇÏ°í ÀÖ´Ù. º» ¹®¼­´Â È¿°úÀûÀ¸·Î ½ºÆÔÀ» Â÷´ÜÇϱâ À§ÇÑ ÇϺα¸Á¶¸¦ Á¤ÀÇÇϴµ¥ °èÃþÀû ¸ðµ¨À» Á¤ÀÇÇÏ°í ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à This document describes technical strategies for countering spam which includes general characteristics of spam and main objectives for countering spam. This document gives a hierarchical model of general categories that can be targeted to establish an efficient and effective infrastructure for countering spam.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.IT-X1231_ed15.pdf TTAE.IT-X1231_ed15.pdf            

ÀÌÀü
³×Æ®¿öÅ© °ü¸®¸¦ À§ÇÑ º¸¾È: º¸¾È ¸ÞÄ¿´ÏÁò
´ÙÀ½
À̸ÞÀÏ ½ºÆÔ Â÷´Ü °ü·Ã ±â¼ú