نتایج جستجو برای: visual memory spam counting spam

تعداد نتایج: 637246  

2006
Chenmin Liang Liyun Ru Xiaoyan Zhu

Spam web pages intend to achieve higher-than-deserved ranking by various techniques. While human experts could easily identify spam web pages, the manual evaluating process of a large number of pages is still time consuming and cost consuming. To assist manual evaluation, we propose an algorithm to assign spam values to web pages and semi-automatically select potential spam web pages. We first ...

2009
Tamara G. Kolda Michael J. Procopio

BadRank is a method for detecting spam web sites, based on the premise that a page is spam if it points to another spam page; i.e., the BadRank score of a page is the weighted sum of the BadRank scores of the pages that it links to. BadRank is an important tool in spam detection. We consider the mathematical structure of BadRank, showing how it can be modified to guarantee that the iterates con...

2013
Ali Asghar Torabi Kaveh Taghipour Shahram Khadivi

Web Spam is the result of a number of methods to deceive search engine algorithms so as to obtain higher ranks in the search results. Advanced spammers use keyword and link stuffing methods to create farms of spam pages. Most of the recent works in the web spam detection literature utilize graph based methods to enhance the accuracy of this task. This paper is basically a probabilistic approach...

2015
Enaitz Ezpeleta Urko Zurutuza José María Gómez Hidalgo

Unsolicited email campaigns remain as one of the biggest threats affecting millions of users per day. Spam filters are capable of detecting and avoiding an increasing number of messages, but researchers have quantified a response rate of a 0.006% [1], still significant to turn a considerable profit. While research directions are addressing topics such as better spam filters, or spam detection i...

2011
Enhua Tan Lei Guo Songqing Chen Xiaodong Zhang

Spam content is surging with an explosive increase of user generated content (UGC) on the Internet. Spammers often insert popular keywords or simply copy and paste recent articles from the Web with spam links inserted, attempting to disable content-based detection. In order to effectively detect spam in user generated content, we first conduct a comprehensive analysis of spamming activities on ...

2009
Christian Kreibich Chris Kanich Kirill Levchenko Brandon Enright Geoffrey M. Voelker Vern Paxson Stefan Savage

Over the last decade, unsolicited bulk email—spam— has evolved dramatically in its volume, its delivery infrastructure and its content. Multiple reports indicate that more than 90% of all email traversing the Internet today is considered spam. This growth is partially driven by a multi-billion dollar anti-spam industry whose dedication to filtering spam in turn requires spammers to recruit botn...

2014
Kanchan Hans Laxmi Ahuja S. K. Muttoo

Spam is a major threat to web security. The web of trust is being abused by the spammers through their ever evolving new tactics for their personal gains. In fact, there is a long chain of spammers who are running huge business campaigns under the web. Spam causes underutilization of search engine resources and creates dissatisfaction among web community. Web Security being a prime challenge fo...

2013
Shayne Loft Daniel B. Morrell Samuel Huf

Extant query-based measures of situation awareness that require interruption of dynamic tasks can be inappropriate in certain work contexts. A candidate real-time query-based method, the situation present assessment method (SPAM), was used to examine participants’ situation awareness in simulated submarine track management. The simulation and situation awareness queries were based upon a goal-d...

2012
Wojciech Indyk Tomasz Kajdanowicz Przemyslaw Kazienko Slawomir Plamowski

The web spam detection problem was considered in the paper. Based on interconnected spam and no-spam hosts a collective classification approach based on label propagation is aimed at discovering the spam hosts. Each host is represented as network node and links between hosts constitute network’s edges. The proposed method provides reasonable results and is able to compute large data as is settl...

Journal: :IT Professional 2016
Chao Chen Jun Zhang Yang Xiang Wanlei Zhou Jonathan Oliver

T witter has become one of the most commonly used communication tools in daily life. With 500 million users, Twitter now generates more than 500 million tweets per day. However, its popularity has also attracted spamming. Spammers spread many intensive tweets, which can lure legitimate users to commercial or malicious sites containing malware downloads, phishing, drug sales, scams, and more.1 S...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید