Figure 1 - uploaded by Esraa Zeki Mohammed
Content may be subject to copyright.
Architecture of email system [13] 

Architecture of email system [13] 

Source publication
Article
Full-text available
E-mail is one of the most popular programs used by most people today. As a result of the continuous daily use, thousands of messages are accumulated in the electronic box of most individuals, which make it difficult for them after a period of time to retrieve the attachments of these messages. Most Email providers constantly improved their search t...

Contexts in source publication

Context 1
... System Architecture The email system architecture is illustrated in Figure (1). It contains two sub systems: (i) the user agents are used to read, send, compose, replies to messages, display incoming messages, and arrange messages by filing, searching, and deleting them. Examples to most common user agents are Google Gmail, Microsoft Outlook, Mozilla and Apple Mail. (ii) The message transfer agents, are used to send messages from the source to the destination with the help of Simple Mail Transfer Protocol (SMTP). They are also known as mail ...
Context 2
... System Architecture The email system architecture is illustrated in Figure (1). It contains two sub systems: (i) the user agents are used to read, send, compose, replies to messages, display incoming messages, and arrange messages by filing, searching, and deleting them. ...

Similar publications

Preprint
Full-text available
A (CBIR) Content Bases Image Retrieval system is the images retrieval that are based on the visual feature like: color, shape and texture. Image retrieval which use single feature were not able to provide efficiency and the accuracy. High level feature will describe the idea of human brain that will be used to reduce efficiency query. The low level...
Article
Full-text available
In this paper, a novel approach for content based image retrieval (CBIR) in diabetic retinopathy (DR) is proposed. The concept of salient point selection and inter-plane relationship technique is used. Salient points are selected from edgy image and later using inter-planer relationship, Local Binary Patterns (LBPs) are calculated using the salient...
Article
Full-text available
In this work, we introduce content based image retrieval CBIR. One of the essential features is colour in an image processing and CBIR so we use the colour histogram and colour moment features in order to compare an inquiry image with the image in the database. The two ways, colour histogram and colour moment have achieved state-of-art results when...
Article
Full-text available
In this paper, we propose a content-based image retrieval (CBIR) approach using color and texture features extracted from block truncation coding based on binary ant colony optimization (BACOBTC). First, we present a near-optimized common bitmap scheme for BTC. Then, we convert the image to two color quantizers and a bitmap image-utilizing BACOBTC....
Article
Full-text available
The management and application of remotely sensed data has become much more difficult due to the dramatically growing volume of remotely sensed imagery. To address this issue, content-based image retrieval (CBIR) has been applied to remote sensing image retrieval for information mining. As a consequence of the growing volume of remotely sensed imag...

Citations

... Email -is a powerful, convenient, and efficient way of communicating over the Internet [1]. In the age of electronic technology, this type of communication is widely used in many fields. ...
Conference Paper
Full-text available
User privacy has become a prominent issue in the digital age, especially with the advent of the Internet and social media. Technologies have opened up new opportunities and different ways for us to communicate. At the same time, they have also brought other avenues and methods for cyberattacks. Email attacks such as the mass sending of malicious messages, links, and phishing dominate among them. Therefore, in our scientific article, we dealt with the most common type of cyberattacks that occur via e-mail. Machine learning methods (ML) have been actively involved in malicious email detection. To find out which algorithm is more effective, we tested different supervised ML algorithms such as Random Forest, Support Vector Machine (SVM), Decision Tree, Naïve Bayes, and K-Nearest Neighbors. And to work with real data, we used some datasets containing emails used in different phishing and bulk emails.KeywordsSpam Filtering SystemE-mail FilteringAlgorithm for MLRandom ForestSupport Vector MachineDecision TreeNaïve BayesK-Nearest Neighbors
... In the context of mortgage origination, where vast amounts of such data are exchanged, the need for robust cybersecurity measures is paramount. The increasing incidences of cyberattacks and data breaches in recent years have underscored the vulnerabilities inherent in digital communication systems [1]. Email and SMS, being the primary modes of communication between lenders, borrowers, and other stakeholders in the mortgage process, demand stringent security protocols to safeguard against such vulnerabilities. ...
... The landscape of secure digital communication has been extensively explored in recent research. Studies have focused on the implementation of advanced encryption techniques for email communications [1]. These techniques are pivotal in ensuring the confidentiality and integrity of sensitive data transmitted between lenders and borrowers. ...
... Research in email security has consistently highlighted the significance of encryption technologies. Studies show the effectiveness of end-to-end encryption in safeguarding email content against unauthorized access [1]. Additionally, the literature discusses the integration of digital signatures and secure email gateways as methods to enhance the security of email communications in the mortgage process. ...
Article
Full-text available
The increasing reliance on digital communication in mortgage origination processes has accentuated the need for robust cybersecurity measures, particularly in the realms of email and SMS communications. This research paper delves into the multifaceted aspects of securing such communications, considering the latest technological advancements, regulatory requirements, and industry practices. Drawing upon an array of academic research and contemporary articles, the study explores innovative methods for email and SMS encryption, the implementation of secure data transmission protocols, and the integration of cybersecurity practices into the mortgage origination process. Key themes include the use of end-to-end encryption technologies, adherence to FTC Safeguards Rule and other regulatory frameworks, and the development of secure messaging protocols tailored for the mortgage industry. The paper also evaluates the effectiveness of these methods in safeguarding sensitive borrower data, ensuring compliance, and maintaining the integrity of the mortgage origination process. By synthesizing theoretical insights and practical approaches, this study aims to provide a comprehensive understanding of the current landscape and future directions in secure communication within mortgage origination, emphasizing the balance between security, efficiency, and user convenience.
Conference Paper
Email security is critical to all types of businesses, as it represents 80% of the plethora of official communication tools used by most organizations worldwide. Attackers use several techniques to trick users into performing harmful actions, mainly via emails. Identifying such activities or circumventing them is better than relying on the end user’s behavior of being unaware. Traditional e-mail systems use centralized servers to provide services, making them a single point of failure if servers are attacked or at least private information is leaked. Thus, a decentralized e-mail system can provide more trust and reliability. This study is an initial attempt to explore the use of Blockchain-based solutions to improve the security and privacy of traditional e-mail systems. This paper presents a two-fold coverage of this problem. First, a summary of common email security architectures is presented, outlined, and criticized for various parameters. Second, we propose a technique for solving the problem of phishing emails by targeting changes in the email system structure using two approaches. The first approach is to improve email security by using Blockchain technology whereas the second approach is by modifying the SSL protocol to disallow the use of similar domains, thereby preventing a considerable number of phishing attempts. We discuss each approach along with its advantages and disadvantages. The paper concludes with future research perspectives on this important topic using the proposed approach.