-
1
-
-
84949626334
-
Spamscatter: Characterizing internet scam hosting infrastructure
-
D. S. Anderson et al. Spamscatter: Characterizing internet scam hosting infrastructure. In Proc. of Usenix Security '07, 2007.
-
(2007)
Proc. of Usenix Security '07
-
-
Anderson, D.S.1
-
2
-
-
40949156882
-
Link-based characterization and detection of web spam
-
L. Becchetti et al. Link-based characterization and detection of web spam. In Proc. of AIRWeb '06, 2006.
-
(2006)
Proc. of AIRWeb '06
-
-
Becchetti, L.1
-
3
-
-
34250660925
-
Spamrank - fully automatic link spam detection
-
A. A. Benczur et al. Spamrank - fully automatic link spam detection. In Proc. of AIRWeb '05, 2005.
-
(2005)
Proc. of AIRWeb '05
-
-
Benczur, A.A.1
-
4
-
-
34547964237
-
A reference collection for web spam
-
C. Castillo et al. A reference collection for web spam. SIGIR Forum, 40(2), 2006.
-
(2006)
SIGIR Forum
, vol.40
, Issue.2
-
-
Castillo, C.1
-
5
-
-
36448992581
-
Know your neighbors: Web spam detection using the web topology
-
C. Castillo et al. Know your neighbors: Web spam detection using the web topology. In Proc. of SIGIR '07, 2007.
-
(2007)
Proc. of SIGIR '07
-
-
Castillo, C.1
-
6
-
-
70349242810
-
Countering web spam with credibility-based link analysis
-
J. Caverlee and L. Liu. Countering web spam with credibility-based link analysis. In Proc. of PODC '07, 2007.
-
(2007)
Proc. of PODC '07
-
-
Caverlee, J.1
Liu, L.2
-
7
-
-
34548791195
-
Spam-resilient web rankings via influence throttling
-
J. Caverlee, S. Webb, and L. Liu. Spam-resilient web rankings via influence throttling. In Proc. of IPDPS '07, 2007.
-
(2007)
Proc. of IPDPS '07
-
-
Caverlee, J.1
Webb, S.2
Liu, L.3
-
8
-
-
8644220983
-
Recognizing nepotistic links on the web
-
B. D. Davison. Recognizing nepotistic links on the web. In Proc. of AIWS '00, 2000.
-
(2000)
Proc. of AIWS '00
-
-
Davison, B.D.1
-
9
-
-
34250684576
-
Thwarting the nigritude ultramarine: Learning to identify link spam
-
I. Drost and T. Scheffer. Thwarting the nigritude ultramarine: Learning to identify link spam. In Proc. of ECML '05, 2005.
-
(2005)
Proc. of ECML '05
-
-
Drost, I.1
Scheffer, T.2
-
10
-
-
33646023117
-
An introduction to ROC analysis
-
T. Fawcett. An introduction to ROC analysis. Pattern Recognition Letters, 27(8), 2006.
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.8
-
-
Fawcett, T.1
-
11
-
-
27344433890
-
Spam, damn spam, and statistics: Using statistical analysis to locate spam web
-
D. Fetterly, M. Manasse, and M. Najork. Spam, damn spam, and statistics: Using statistical analysis to locate spam web pages. In Proc. of WebDB '04, 2004.
-
(2004)
Proc. of WebDB '04
-
-
Fetterly, D.1
Manasse, M.2
Najork, M.3
-
13
-
-
2942731012
-
An extensive empirical study of feature selection metrics for text classification
-
G. Forman. An extensive empirical study of feature selection metrics for text classification. The Journal of Machine Learning Research, 3, 2003.
-
(2003)
The Journal of Machine Learning Research
, vol.3
-
-
Forman, G.1
-
14
-
-
27344439205
-
Spam: It's not just for inboxes anymore
-
Z. Gyöngyi and H. Garcia-Molina. Spam: It's not just for inboxes anymore. Computer, 38(10), 2005.
-
(2005)
Computer
, vol.38
, Issue.10
-
-
Gyöngyi, Z.1
Garcia-Molina, H.2
-
17
-
-
0003257192
-
Webbase : A repository of web
-
J. Hirai. Webbase : A repository of web pages. In Proc. of WWW '00, 2000.
-
(2000)
Proc. of WWW '00
-
-
Hirai, J.1
-
18
-
-
85164392958
-
A study of cross-validation and bootstrap for accuracy estimation and model selection
-
R. Kohavi. A study of cross-validation and bootstrap for accuracy estimation and model selection. In Proc. of IJCAI '95, 1995.
-
(1995)
Proc. of IJCAI '95
-
-
Kohavi, R.1
-
20
-
-
40249106140
-
A crawler-based study of spyware in the web
-
A. Moshchuk et al. A crawler-based study of spyware in the web. In Proc. of NDSS '06, 2006.
-
(2006)
Proc. of NDSS '06
-
-
Moshchuk, A.1
-
21
-
-
85076893377
-
Spyproxy: Execution-based detection of malicious web content
-
A. Moshchuk et al. Spyproxy: Execution-based detection of malicious web content. In Proc. of Usenix Security '07, 2007.
-
(2007)
Proc. of Usenix Security '07
-
-
Moshchuk, A.1
-
22
-
-
35549011670
-
Detecting spam web pages through content analysis
-
A. Ntoulas et al. Detecting spam web pages through content analysis. In Proc. of WWW '06, 2006.
-
(2006)
Proc. of WWW '06
-
-
Ntoulas, A.1
-
23
-
-
70349236622
-
The ghost in the browser: Analysis of web-based malware
-
N. Provos et al. The ghost in the browser: Analysis of web-based malware. In Proc. of HotBots '07, 2007.
-
(2007)
Proc. of HotBots '07
-
-
Provos, N.1
-
24
-
-
0016572913
-
A vector space model for automatic indexing
-
G. Salton, A. Wong, and C. S. Yang. A vector space model for automatic indexing. Comm. of the ACM, 18(11), 1975.
-
(1975)
Comm. of the ACM
, vol.18
, Issue.11
-
-
Salton, G.1
Wong, A.2
Yang, C.S.3
-
25
-
-
33750356750
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
Y. M. Wang et al. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In Proc. of NDSS '06, 2006.
-
(2006)
Proc. of NDSS '06
-
-
Wang, Y.M.1
-
26
-
-
84904820148
-
Introducing the webb spam corpus: Using email spam to identify web spam automatically
-
S. Webb, J. Caverlee, and C. Pu. Introducing the webb spam corpus: Using email spam to identify web spam automatically. In Proc. of CEAS '06, 2006.
-
(2006)
Proc. of CEAS '06
-
-
Webb, S.1
Caverlee, J.2
Pu, C.3
-
27
-
-
84904821876
-
Characterizing web spam using content and http session analysis
-
S. Webb, J. Caverlee, and C. Pu. Characterizing web spam using content and http session analysis. In Proc. of CEAS '07, 2007.
-
(2007)
Proc. of CEAS '07
-
-
Webb, S.1
Caverlee, J.2
Pu, C.3
-
30
-
-
0003141935
-
A comparative study of feature selection in text categorization
-
Y. Yang and J. O. Pederson. A comparative study of feature selection in text categorization. In Proc. of ICML '97, 1997.
-
(1997)
Proc. of ICML '97
-
-
Yang, Y.1
Pederson, J.O.2
|