Sciweavers

248 search results - page 3 / 50
» Characterizing a spam traffic
Sort
View
WWW
2007
ACM
15 years 10 months ago
Spam double-funnel: connecting web spammers with advertisers
Spammers use questionable search engine optimization (SEO) techniques to promote their spam links into top search results. In this paper, we focus on one prevalent type of spam ? ...
Yi-Min Wang, Ming Ma, Yuan Niu, Hao Chen
78
Voted
AIRWEB
2007
Springer
15 years 3 months ago
Using Spam Farm to Boost PageRank
Nowadays web spamming has emerged to take the economic advantage of high search rankings and threatened the accuracy and fairness of those rankings. Understanding spamming techniq...
Ye Du, Yaoyun Shi, Xin Zhao
CEAS
2005
Springer
15 years 2 months ago
Comparative Graph Theoretical Characterization of Networks of Spam
Email is an increasingly important and ubiquitous means of communication, both facilitating contact between individuals and enabling rises in the productivity of organizations. Ho...
Luíz Henrique Gomes, Rodrigo B. Almeida, Lu...
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
14 years 7 months ago
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique
Spam is increasingly accepted as a problem associated with compromised hosts or email accounts. This problem not only makes the tracking of spam sources difficult but also enables ...
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fa...
CCS
2006
ACM
15 years 1 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang