Sciweavers

409 search results - page 15 / 82
» Review spam detection
Sort
View
ITRUST
2005
Springer
15 years 5 months ago
Risk Models for Trust-Based Access Control(TBAC)
The importance of risk in trust-based systems is well established. This paper presents a novel model of risk and decision-making based on economic theory. Use of the model is illus...
Nathan Dimmock, Jean Bacon, David Ingram, Ken Mood...
CEAS
2006
Springer
15 years 3 months ago
Dynamic Port 25 Blocking to Control SPAM Zombies
This paper presents the results of a case study in which outbound SPAM, here referring to excessive amounts of bulk-generated email, is suppressed using dynamic Port 25 blocking. ...
Jonathan Schmidt
SIGSOFT
2007
ACM
16 years 18 days ago
Training on errors experiment to detect fault-prone software modules by spam filter
The fault-prone module detection in source code is of importance for assurance of software quality. Most of previous fault-prone detection approaches are based on software metrics...
Osamu Mizuno, Tohru Kikuno
SIGIR
2012
ACM
13 years 2 months ago
Fighting against web spam: a novel propagation method based on click-through data
Combating Web spam is one of the greatest challenges for Web search engines. State-of-the-art anti-spam techniques focus mainly on detecting varieties of spam strategies, such as ...
Chao Wei, Yiqun Liu, Min Zhang, Shaoping Ma, Liyun...
DSN
2009
IEEE
15 years 6 months ago
Spam detection in voice-over-IP calls through semi-supervised clustering
In this paper, we present an approach for detection of spam calls over IP telephony called SPIT in VoIP systems. SPIT detection is different from spam detection in email in that t...
Yu-Sung Wu, Saurabh Bagchi, Navjot Singh, Ratsamee...