Sciweavers

146 search results - page 25 / 30
» Spectrum based fraud detection in social networks
Sort
View
KDD
2008
ACM
186views Data Mining» more  KDD 2008»
14 years 8 months ago
Scalable and near real-time burst detection from eCommerce queries
In large scale online systems like Search, eCommerce, or social network applications, user queries represent an important dimension of activities that can be used to study the imp...
Nish Parikh, Neel Sundaresan
DASFAA
2010
IEEE
169views Database» more  DASFAA 2010»
13 years 5 months ago
Fires on the Web: Towards Efficient Exploring Historical Web Graphs
Abstract. Discovery of evolving regions in large graphs is an important issue because it is the basis of many applications such as spam websites detection in the Web, community lif...
Zhenglu Yang, Jeffrey Xu Yu, Zheng Liu, Masaru Kit...
AIRWEB
2007
Springer
14 years 1 months ago
Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms. The presence of splogs degrades blog search results as well...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
INFORMATICALT
2010
145views more  INFORMATICALT 2010»
13 years 4 months ago
GSM Speech Coder Indirect Identification Algorithm
This paper presents GSM speech coder indirect identification algorithm based on sending novel identification pilot signals through the GSM speech channel. Each GSM subsystem distur...
Rajko Svecko, Bojan Kotnik, Amor Chowdhury, Zdenko...
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
14 years 1 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...