-
6
-
-
78650033432
-
-
Google. Google safebrowsing API. http://code.google.com/apis/ safebrowsing/, 2010.
-
(2010)
Google Safebrowsing API
-
-
-
7
-
-
78650034605
-
-
March 2010
-
D. Harvey. Trust and safety. http://blog.twitter.com/2010/03/trust-and- safety.html, March 2010.
-
Trust and Safety
-
-
Harvey, D.1
-
11
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
ACM
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamalytics: An empirical analysis of spam marketing conversion. In Proceedings of the 15th ACM Conference on Computer and Communications Security, pages 3-14. ACM, 2008.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 3-14
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.5
Paxson, V.6
Savage, S.7
-
12
-
-
77954619566
-
What is Twitter, a social network or a news media?
-
H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social network or a news media? In Proceedings of the International World Wide Web Conference, 2010.
-
(2010)
Proceedings of the International World Wide Web Conference
-
-
Kwak, H.1
Lee, C.2
Park, H.3
Moon, S.4
-
15
-
-
80055040215
-
RT @IWantPrivacy: Widespread violation of privacy settings in the Twitter social network
-
B. Meeder, J. Tam, P. G. Kelley, and L. F. Cranor. RT @IWantPrivacy: Widespread violation of privacy settings in the Twitter social network. In Web 2.0 Security and Privacy, 2010.
-
(2010)
Web 2.0 Security and Privacy
-
-
Meeder, B.1
Tam, J.2
Kelley, P.G.3
Cranor, L.F.4
-
17
-
-
80052012580
-
-
A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G. Voelker, V. Paxson, N. Weaver, and S. Savage. Botnet Judo: Fighting spam with itself. 2010.
-
(2010)
Botnet Judo: Fighting Spam with Itself
-
-
Pitsillidis, A.1
Levchenko, K.2
Kreibich, C.3
Kanich, C.4
Voelker, G.5
Paxson, V.6
Weaver, N.7
Savage, S.8
-
19
-
-
0009304541
-
A Bayesian approach to filtering junk e-mail
-
Madison, Wisconsin: AAAI Technical Report WS-98-05
-
M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz. A Bayesian approach to filtering junk e-mail. In Learning for Text Categorization: Papers from the 1998 workshop. Madison, Wisconsin: AAAI Technical Report WS-98-05, 1998.
-
(1998)
Learning for Text Categorization: Papers from the 1998 Workshop
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
22
-
-
78649999189
-
-
Twitter. The Twitter rules. http://help.twitter.com/forums/26257/entries/ 18311, 2009.
-
(2009)
The Twitter Rules
-
-
-
24
-
-
35348904515
-
Spam double-funnel: Connecting web spammers with advertisers
-
Y. Wang, M. Ma, Y. Niu, and H. Chen. Spam double-funnel: Connecting web spammers with advertisers. In Proceedings of the International World Wide Web Conference, pages 291-300, 2007.
-
(2007)
Proceedings of the International World Wide Web Conference
, pp. 291-300
-
-
Wang, Y.1
Ma, M.2
Niu, Y.3
Chen, H.4
-
27
-
-
58449122201
-
Spamming botnets: Signatures and characteristics
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming botnets: Signatures and characteristics. Proceedings of ACM SIGCOMM, 2008.
-
(2008)
Proceedings of ACM SIGCOMM
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
|