Sciweavers

551 search results - page 36 / 111
» Social spam detection
Sort
View
ECRIME
2007
14 years 23 days ago
A comparison of machine learning techniques for phishing detection
There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...
NSDI
2008
13 years 11 months ago
Ostra: Leveraging Trust to Thwart Unwanted Communication
Online communication media such as email, instant messaging, bulletin boards, voice-over-IP, and social networking sites allow any sender to reach potentially millions of users at...
Alan Mislove, Ansley Post, Peter Druschel, P. Kris...
CEAS
2005
Springer
14 years 2 months ago
Experiences with Greylisting
Greylisting temporarily rejects mail from unknown sources on the theory that real mailers will retry while spamware won’t. I outline a taxonomy of greylisters and report some st...
John R. Levine
RECSYS
2009
ACM
14 years 3 months ago
An incentive-based architecture for social recommendations
We present an incentive-based architecture for providing recommendations in a social network. We maintain a distinct reputation system for each individual and we rely on users to ...
Rajat Bhattacharjee, Ashish Goel, Konstantinos Kol...
ICDM
2010
IEEE
202views Data Mining» more  ICDM 2010»
13 years 6 months ago
Discovering Overlapping Groups in Social Media
Abstract--The increasing popularity of social media is shortening the distance between people. Social activities, e.g., tagging in Flickr, bookmarking in Delicious, twittering in T...
Xufei Wang, Lei Tang, Huiji Gao, Huan Liu