Sciweavers

79 search results - page 13 / 16
» Link Spam Alliances
Sort
View
TES
2001
Springer
13 years 12 months ago
Peer-to-Peer Traced Execution of Composite Services
Abstract. The connectivity generated by the Internet is opening unprecedented opportunities of automating business-to-business collaborations. As a result, organisations of all siz...
Marie-Christine Fauvet, Marlon Dumas, Boualem Bena...
IPPS
2007
IEEE
14 years 1 months ago
Peak-Performance DFA-based String Matching on the Cell Processor
The security of your data and of your network is in the hands of intrusion detection systems, virus scanners and spam filters, which are all critically based on string matching. ...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
JCS
2010
135views more  JCS 2010»
13 years 6 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
MM
2010
ACM
174views Multimedia» more  MM 2010»
13 years 7 months ago
Image classification using the web graph
Image classification is a well-studied and hard problem in computer vision. We extend a proven solution for classifying web spam to handle images. We exploit the link structure of...
Dhruv Kumar Mahajan, Malcolm Slaney
AIRWEB
2007
Springer
14 years 1 months ago
Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms. The presence of splogs degrades blog search results as well...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...