ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAE.IT-X1231 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2009-12-22 ÃÑ ÆäÀÌÁö 31
ÇÑ±Û Ç¥ÁØ¸í ½ºÆÔ Â÷´Ü¿¡ ´ëÇÑ ±â¼úÀû Àü·«
¿µ¹® Ç¥Áظí Technical strategies for countering spam
ÇÑ±Û ³»¿ë¿ä¾à º» ¹®¼­´Â ½ºÆÔÀ» Â÷´ÜÇÏ´Â ´Ù¾çÇÑ ±â¼úÀû Àü·«¿¡ ´ëÇØ ¼³¸íÇϰí ÀÖ¾î ½ºÆÔÀÇ ÀϹÝÀûÀΠƯ¡°ú ½ºÆÔ Â÷´ÜÀÇ ÁÖ¿ä ¸ñÀûÀ» Á¤ÀÇÇϰí ÀÖ´Ù. º» ¹®¼­´Â È¿°úÀûÀ¸·Î ½ºÆÔÀ» Â÷´ÜÇϱâ À§ÇÑ ÇϺα¸Á¶¸¦ Á¤ÀÇÇϴµ¥ °èÃþÀû ¸ðµ¨À» Á¤ÀÇÇϰí ÀÖ´Ù.
¿µ¹® ³»¿ë¿ä¾à This document describes technical strategies for countering spam which includes general characteristics of spam and main objectives for countering spam. This document gives a hierarchical model of general categories that can be targeted to establish an efficient and effective infrastructure for countering spam.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAE.IT-X1231_ed15.pdf TTAE.IT-X1231_ed15.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
½ºÆÔ Â÷´Ü¿¡ ´ëÇÑ ±â¼úÀû Àü·« TTAE.IT-X1231 2009-12-22 Á¦Á¤ À¯È¿ ¾øÀ½ TTAE.IT-X1231_ed15.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2018-05-31 À¯Áö