Sciweavers

551 search results - page 62 / 111
» Social spam detection
Sort
View
SIGCOMM
2010
ACM
14 years 11 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
70
Voted
ATAL
2009
Springer
15 years 5 months ago
Monitoring social expectations in Second Life
Online virtual worlds such as Second Life provide a rich medium for unstructured human interaction in a shared simulated 3D environment. However, many human interactions take place...
Stephen Cranefield, Guannan Li
202
Voted
WWW
2011
ACM
14 years 5 months ago
Truthy: mapping the spread of astroturf in microblog streams
Online social media are complementing and in some cases replacing person-to-person social interaction and redefining the diffusion of information. In particular, microblogs have ...
Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bru...
82
Voted
OZCHI
2006
ACM
15 years 4 months ago
AuraOrb: using social awareness cues in the design of progressive notification appliances
One of the problems with notification appliances is that they can be distracting when providing information not of immediate interest to the user. In this paper, we present AuraOr...
Mark Altosaar, Roel Vertegaal, Changuk Sohn, Danie...
KESAMSTA
2009
Springer
15 years 3 months ago
Structural Changes in an Email-Based Social Network
ent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory Chung-Ming Ou, C.R. Ou Ants-like Agents: a Model and Analysis Based on Natural Ants Be...
Krzysztof Juszczyszyn, Katarzyna Musial