Search Results

There are 12525 results for: content related to: A link graph-based approach to identify forum spam

  1. Spammers operations: a multifaceted strategic analysis

    Security and Communication Networks

    Volume 9, Issue 4, 10 March 2016, Pages: 336–356, O. Thonnard, Pierre-Antoine Vervier and M. Dacier

    Version of Record online : 9 OCT 2012, DOI: 10.1002/sec.640

  2. Packet-level open-digest fingerprinting for spam detection on middleboxes

    International Journal of Network Management

    Volume 22, Issue 1, January/February 2012, Pages: 12–26, Muhammad N. Marsono

    Version of Record online : 20 APR 2011, DOI: 10.1002/nem.780

  3. Detecting Non-personal and Spam Users on Geo-tagged Twitter Network

    Transactions in GIS

    Volume 18, Issue 3, June 2014, Pages: 370–384, Diansheng Guo and Chao Chen

    Version of Record online : 13 JUN 2014, DOI: 10.1111/tgis.12101

  4. Detecting spam through their Sender Policy Framework records

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3555–3563, Devrim Sipahi, Gökhan Dalk��l��ç and Mehmet Hilal Özcanhan

    Version of Record online : 25 MAY 2015, DOI: 10.1002/sec.1280

  5. Simple SMS spam filtering on independent mobile phone

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1209–1220, M. Taufiq Nuruzzaman, Changmoo Lee, Mohd. Fikri Azli bin Abdullah and Deokjai Choi

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.577

  6. Are Individual Investors Influenced by the Optimism and Credibility of Stock Spam Recommendations?

    Journal of Business Finance & Accounting

    Volume 40, Issue 9-10, November/December 2013, Pages: 1155–1183, Karen K. Nelson, Richard A. Price and Brian R. Rountree

    Version of Record online : 17 DEC 2013, DOI: 10.1111/jbfa.12053

  7. A novel approach for spam email detection based on shifted binary patterns

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1216–1225, Yılmaz Kaya and Ömer Faruk Ertuğrul

    Version of Record online : 11 JAN 2016, DOI: 10.1002/sec.1412

  8. Query recommendation in the information domain of children

    Journal of the Association for Information Science and Technology

    Volume 65, Issue 7, July 2014, Pages: 1368–1384, Sergio Duarte Torres, Djoerd Hiemstra, Ingmar Weber and Pavel Serdyukov

    Version of Record online : 25 FEB 2014, DOI: 10.1002/asi.23055

  9. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1157

  10. SPEAR: SPAMMING-RESISTANT EXPERTISE ANALYSIS AND RANKING IN COLLABORATIVE TAGGING SYSTEMS

    Computational Intelligence

    Volume 27, Issue 3, August 2011, Pages: 458–488, Ching-man Au Yeung, Michael G. Noll, Nicholas Gibbins, Christoph Meinel and Nigel Shadbolt

    Version of Record online : 19 SEP 2011, DOI: 10.1111/j.1467-8640.2011.00384.x

  11. An intelligent three-phase spam filtering method based on decision tree data mining

    Security and Communication Networks

    Jyh-Jian Sheu, Yin-Kai Chen, Ko-Tsung Chu, Jih-Hsin Tang and Wei-Pang Yang

    Version of Record online : 25 AUG 2016, DOI: 10.1002/sec.1584

  12. Blocking spam by separating end-user machines from legitimate mail server machines

    Security and Communication Networks

    Volume 9, Issue 4, 10 March 2016, Pages: 316–326, Fernando Sanchez, Zhenhai Duan and Yingfei Dong

    Version of Record online : 27 JUN 2012, DOI: 10.1002/sec.587

  13. SpamED: A spam E-mail detection approach based on phrase similarity

    Journal of the American Society for Information Science and Technology

    Volume 60, Issue 2, February 2009, Pages: 393–409, Maria Soledad Pera and Yiu-Kai Ng

    Version of Record online : 3 OCT 2008, DOI: 10.1002/asi.20962

  14. Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1094–1101, Young Hoon Moon, Eunjin Kim, Suh Mahn Hur and Huy Kang Kim

    Version of Record online : 6 FEB 2012, DOI: 10.1002/sec.431

  15. Filtering and email pricing as solutions to spam

    Canadian Journal of Economics/Revue canadienne d'économique

    Volume 46, Issue 3, August / août 2013, Pages: 881–899, B. Curtis Eaton, Ian A. MacDonald and Laura Meriluoto

    Version of Record online : 20 AUG 2013, DOI: 10.1111/caje.12043

  16. Wirebrush4SPAM: a novel framework for improving efficiency on spam filtering services

    Software: Practice and Experience

    Volume 43, Issue 11, November 2013, Pages: 1299–1318, N. Pérez-Díaz, D. Ruano-Ordas, F. Fdez-Riverola and J.R. Méndez

    Version of Record online : 18 JUN 2012, DOI: 10.1002/spe.2135

  17. Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 626–640, Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu and Yuan-Cheng Lai

    Version of Record online : 21 MAR 2013, DOI: 10.1002/sec.764

  18. Experience in management of e-mail delivery delay problems associated with spam e-mail filtering in a university

    Electronics and Communications in Japan

    Volume 95, Issue 1, January 2012, Pages: 8–19, Yutaka Hisanaga, Manabu Sugii, Yue Wang, Atsushi Osa and Hidetoshi Miike

    Version of Record online : 21 DEC 2011, DOI: 10.1002/ecj.10393

  19. Compression-based spam filter

    Security and Communication Networks

    Volume 9, Issue 4, 10 March 2016, Pages: 327–335, Tiago A. Almeida and Akebo Yamakami

    Version of Record online : 25 SEP 2012, DOI: 10.1002/sec.639

  20. You have free access to this content
    The hidden impacts of anti-spam measures and their contribution to the digital divide: An exploratory study

    Proceedings of the American Society for Information Science and Technology

    Volume 41, Issue 1, 2004, Pages: 176–183, Christopher P. Lueg

    Version of Record online : 22 SEP 2005, DOI: 10.1002/meet.1450410120