Sciweavers

28 search results - page 5 / 6
» Exploiting social networking sites for spam
Sort
View
ICMCS
2007
IEEE
144views Multimedia» more  ICMCS 2007»
14 years 8 days ago
Splog Detection using Content, Time and Link Structures
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms and splogs corrupt blog search results as well as waste netw...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
AIRWEB
2007
Springer
14 years 4 days ago
Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms. The presence of splogs degrades blog search results as well...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
PVLDB
2008
205views more  PVLDB 2008»
13 years 5 months ago
Making SENSE: socially enhanced search and exploration
Online communities like Flickr, del.icio.us and YouTube have established themselves as very popular and powerful services for publishing and searching contents, but also for ident...
Tom Crecelius, Mouna Kacimi, Sebastian Michel, Tho...
RECSYS
2009
ACM
14 years 14 days ago
Increasing engagement through early recommender intervention
Social network sites rely on the contributions of their members to create a lively and enjoyable space. Recent research has focused on using personalization and recommender techno...
Jill Freyne, Michal Jacovi, Ido Guy, Werner Geyer
NDSS
2009
IEEE
14 years 20 days ago
Detecting Forged TCP Reset Packets
Several off-the-shelf products enable network operators to enforce usage restrictions by actively terminating connections when deemed undesirable. While the spectrum of their appl...
Nicholas Weaver, Robin Sommer, Vern Paxson