Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IT-X1231 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2009-12-22 ÃÑÆäÀÌÁö 31
ÇѱÛÇ¥ÁØ¸í ½ºÆÔ Â÷´Ü¿¡ ´ëÇÑ ±â¼úÀû Àü·«
¿µ¹®Ç¥Áظí Technical strategies for countering spam
Çѱ۳»¿ë¿ä¾à º» ¹®¼­´Â ½ºÆÔÀ» Â÷´ÜÇÏ´Â ´Ù¾çÇÑ ±â¼úÀû Àü·«¿¡ ´ëÇØ ¼³¸íÇÏ°í ÀÖ¾î ½ºÆÔÀÇ ÀϹÝÀûÀΠƯ¡°ú ½ºÆÔ Â÷´ÜÀÇ ÁÖ¿ä ¸ñÀûÀ» Á¤ÀÇÇÏ°í ÀÖ´Ù. º» ¹®¼­´Â È¿°úÀûÀ¸·Î ½ºÆÔÀ» Â÷´ÜÇϱâ À§ÇÑ ÇϺα¸Á¶¸¦ Á¤ÀÇÇϴµ¥ °èÃþÀû ¸ðµ¨À» Á¤ÀÇÇÏ°í ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à This document describes technical strategies for countering spam which includes general characteristics of spam and main objectives for countering spam. This document gives a hierarchical model of general categories that can be targeted to establish an efficient and effective infrastructure for countering spam.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.IT-X1231_ed15.pdf TTAE.IT-X1231_ed15.pdf            

ÀÌÀü
°ø°ø ¼­ºñ½º ·Îº¿ÀÇ ÀÚµ¿ÃæÀü ¾ÈÀü¼º Æò°¡¹æ¹ý
´ÙÀ½
Áö´ÉÇü ·Îº¿ÀÇ ¾ó±¼ °ËÃâ ¹× ½Äº° ¾Ë°í¸®µë ¼º´ÉÆò°¡¹æ¹ý:Á¦2ºÎ Àΰ£¸ðÇü(¸¶³×Ų)À» »ç¿ëÇÑ ½Ã½ºÅÛ ·¹º§ ¼º´ÉÆò°¡