Sciweavers

409 search results - page 39 / 82
» Review spam detection
Sort
View
KDD
2005
ACM
161views Data Mining» more  KDD 2005»
16 years 7 days ago
Combining email models for false positive reduction
Machine learning and data mining can be effectively used to model, classify and discover interesting information for a wide variety of data including email. The Email Mining Toolk...
Shlomo Hershkop, Salvatore J. Stolfo
SOUPS
2006
ACM
15 years 5 months ago
The methodology and an application to fight against Unicode attacks
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...
AIR
2004
131views more  AIR 2004»
14 years 11 months ago
A Survey of Outlier Detection Methodologies
Abstract. Outlier detection has been used for centuries to detect and, where appropriate, remove anomalous observations from data. Outliers arise due to mechanical faults, changes ...
Victoria J. Hodge, Jim Austin
ESANN
2006
15 years 1 months ago
Outlier identification with the Harmonic Topographic Mapping
We review two versions of a topology preserving algorithm one of which we had previously [1] found to be more successful in defining smooth manifolds and tight clusters. In the con...
Marian Pena, Colin Fyfe
ACSAC
2006
IEEE
15 years 6 months ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...