-
1
-
-
57349163398
-
Knowledge sharing and yahoo answers: Everyone knows something
-
L. A. Adamic, J. Zhang, E. Bakshy, and M. S. Ackerman. Knowledge sharing and yahoo answers: everyone knows something. In WWW, 2008.
-
(2008)
WWW
-
-
Adamic, L.A.1
Zhang, J.2
Bakshy, E.3
Ackerman, M.S.4
-
2
-
-
84876833271
-
Link-based characterization and detection of web spam
-
L. Becchetti, C. Castillo, D. Donato, S. Leonardi, and R. Baeza-Yates. Link-based characterization and detection of web spam. In SIGIR Workshop on Adversarial Information Retrieval on the Web, 2006.
-
(2006)
SIGIR Workshop on Adversarial Information Retrieval on the Web
-
-
Becchetti, L.1
Castillo, C.2
Donato, D.3
Leonardi, S.4
Baeza-Yates, R.5
-
4
-
-
72449133353
-
Detecting spammers and content promoters in online video social networks
-
F. Benevenuto, T. Rodrigues, V. Almeida, J. Almeida, and M. Gonçalves. Detecting spammers and content promoters in online video social networks. In SIGIR, 2009.
-
(2009)
SIGIR
-
-
Benevenuto, F.1
Rodrigues, T.2
Almeida, V.3
Almeida, J.4
Gonçalves, M.5
-
5
-
-
33749608129
-
Profiles as conversation: Networked identity performance on friendster
-
D. Boyd and J. Heer. Profiles as conversation: Networked identity performance on friendster. In HICSS, 2006.
-
(2006)
HICSS
-
-
Boyd, D.1
Heer, J.2
-
6
-
-
33845807843
-
Spam filtering using statistical data compression models
-
A. Bratko, B. Filipič, G. V. Cormack, T. R. Lynam, and B. Zupan. Spam filtering using statistical data compression models. J. Mach. Learn. Res., 7:2673-2698, 2006.
-
(2006)
J. Mach. Learn. Res.
, vol.7
, pp. 2673-2698
-
-
Bratko, A.1
Filipič, B.2
Cormack, G.V.3
Lynam, T.R.4
Zupan, B.5
-
7
-
-
76649137380
-
Social networks and context-aware spam
-
G. Brown, T. Howe, M. Ihbe, A. Prakash, and K. Borders. Social networks and context-aware spam. In CSCW, 2008.
-
(2008)
CSCW
-
-
Brown, G.1
Howe, T.2
Ihbe, M.3
Prakash, A.4
Borders, K.5
-
8
-
-
79960299396
-
A large-scale study of myspace: Observations and implications for online social networks
-
J. Caverlee and S. Webb. A large-scale study of myspace: Observations and implications for online social networks. In ICWSM, 2008.
-
(2008)
ICWSM
-
-
Caverlee, J.1
Webb, S.2
-
9
-
-
47649092539
-
Email spam filtering: A systematic review
-
G. V. Cormack. Email spam filtering: A systematic review. Found. Trends Inf. Retr., 1(4):335-455, 2007.
-
(2007)
Found. Trends Inf. Retr.
, vol.1
, Issue.4
, pp. 335-455
-
-
Cormack, G.V.1
-
13
-
-
36348956237
-
Fighting spam on social web sites: A survey of approaches and future challenges
-
P. Heymann, G. Koutrika, and H. Garcia-Molina. Fighting spam on social web sites: A survey of approaches and future challenges. IEEE Internet Computing, 11(6):36-45, 2007.
-
(2007)
IEEE Internet Computing
, vol.11
, Issue.6
, pp. 36-45
-
-
Heymann, P.1
Koutrika, G.2
Garcia-Molina, H.3
-
14
-
-
34848911641
-
Social phishing
-
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Commun. ACM, 50(10):94-100, 2007.
-
(2007)
Commun. ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
16
-
-
33645791274
-
Honeycomb: Creating intrusion detection signatures using honeypots
-
C. Kreibich and J. Crowcroft. Honeycomb: creating intrusion detection signatures using honeypots. SIGCOMM Comput. Commun. Rev., 34(1):51-56, 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.1
, pp. 51-56
-
-
Kreibich, C.1
Crowcroft, J.2
-
17
-
-
42549154625
-
Splog detection using self-similarity analysis on blog temporal dynamics
-
Y.-R. Lin, H. Sundaram, Y. Chi, J. Tatemura, and B. L. Tseng. Splog detection using self-similarity analysis on blog temporal dynamics. In WWW Workshop on Adversarial Information Retrieval on the Web, 2007.
-
(2007)
WWW Workshop on Adversarial Information Retrieval on the Web
-
-
Lin, Y.-R.1
Sundaram, H.2
Chi, Y.3
Tatemura, J.4
Tseng, B.L.5
-
18
-
-
63049138030
-
Unveiling facebook: A measurement study of social network based applications
-
A. Nazir, S. Raza, and C.-N. Chuah. Unveiling facebook: a measurement study of social network based applications. In SIGCOMM, 2008.
-
(2008)
SIGCOMM
-
-
Nazir, A.1
Raza, S.2
Chuah, C.-N.3
-
19
-
-
84948481845
-
An algorithm for suffix stripping
-
M. F. Porter. An algorithm for suffix stripping. Program, 14(3):130-137, 1980.
-
(1980)
Program
, vol.14
, Issue.3
, pp. 130-137
-
-
Porter, M.F.1
-
20
-
-
84904819430
-
Understanding how spammers steal your e-mail address: An analysis of the first six months of data from project honey pot
-
M. B. Prince, B. M. Dahl, L. Holloway, A. M. Keller, and E. Langheinrich. Understanding how spammers steal your e-mail address: An analysis of the first six months of data from project honey pot. In the Conference on Email and Anti-Spam (CEAS), 2005.
-
(2005)
The Conference on Email and Anti-Spam (CEAS)
-
-
Prince, M.B.1
Dahl, B.M.2
Holloway, L.3
Keller, A.M.4
Langheinrich, E.5
-
22
-
-
1642516070
-
The honeynet project: Trapping the hackers
-
L. Spitzner. The honeynet project: Trapping the hackers. IEEE Security and Privacy, 1(2):15-23, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.2
, pp. 15-23
-
-
Spitzner, L.1
-
25
-
-
12244269947
-
Density-based spam detector
-
K. Yoshida, F. Adachi, T. Washio, H. Motoda, T. Homma, A. Nakashima, H. Fujikawa, and K. Yamazaki. Density-based spam detector. In SIGKDD, 2004.
-
(2004)
SIGKDD
-
-
Yoshida, K.1
Adachi, F.2
Washio, T.3
Motoda, H.4
Homma, T.5
Nakashima, A.6
Fujikawa, H.7
Yamazaki, K.8
|