Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IT-X1231 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2009-12-22 ÃÑÆäÀÌÁö 31
ÇѱÛÇ¥ÁØ¸í ½ºÆÔ Â÷´Ü¿¡ ´ëÇÑ ±â¼úÀû Àü·«
¿µ¹®Ç¥Áظí Technical strategies for countering spam
Çѱ۳»¿ë¿ä¾à º» ¹®¼­´Â ½ºÆÔÀ» Â÷´ÜÇÏ´Â ´Ù¾çÇÑ ±â¼úÀû Àü·«¿¡ ´ëÇØ ¼³¸íÇÏ°í ÀÖ¾î ½ºÆÔÀÇ ÀϹÝÀûÀΠƯ¡°ú ½ºÆÔ Â÷´ÜÀÇ ÁÖ¿ä ¸ñÀûÀ» Á¤ÀÇÇÏ°í ÀÖ´Ù. º» ¹®¼­´Â È¿°úÀûÀ¸·Î ½ºÆÔÀ» Â÷´ÜÇϱâ À§ÇÑ ÇϺα¸Á¶¸¦ Á¤ÀÇÇϴµ¥ °èÃþÀû ¸ðµ¨À» Á¤ÀÇÇÏ°í ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à This document describes technical strategies for countering spam which includes general characteristics of spam and main objectives for countering spam. This document gives a hierarchical model of general categories that can be targeted to establish an efficient and effective infrastructure for countering spam.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.IT-X1231_ed15.pdf TTAE.IT-X1231_ed15.pdf            

ÀÌÀü
IMT-2000 3GPP - 3G º¸¾È; MILENAGE ¾Ë°í¸®Áò ¼¼Æ®ÀÇ ±Ô°Ý; 3GPP ÀÎÁõ°ú Å° »ý¼º ±â´É f1. f1*, f2. f3, f4, f5, f5*ÀÇ ¿¹½Ã ¾Ë°í¸®Áò ¼¼Æ®; ¹®¼­2; ¾Ë°í¸®Áò ±Ô°Ý(R8)
´ÙÀ½
IMT-2000 3GPP-3GPP ºñ¹ÐÀ¯Áö ¹× ÅëÇÕ¾Ë°í¸®Áò UEA2¿Í UIA2 ±Ô°Ý; ¹®¼­2; SNOW 3G ±Ô°Ý(R8)