Return to Article Details Research of methods and algorithms for protecting network resources from spam Download Download PDF