659 Hits in 4.6 sec

Key Parameters in Identifying Cost of Spam 2.0

Farida Ridzuan, Vidyasagar Potdar, Alex Talevski, William F. Smyth
2010 2010 24th IEEE International Conference on Advanced Information Networking and Applications  
This paper aims to provide an analytical view in estimating the cost of Spam 2.0. For this purpose, the authors define the web spam lifecycle and its associated impact.  ...  Ongoing research in developing honey spam is also presented in this paper. Keywords-component; web spam, cost of spam I.  ...  In this case, storage cost as defined in equation 1 has to be paid by the content provider. Storage cost is wasted for spam content. Hence, there is a need for someone to manage this forum or blog.  ... 
doi:10.1109/aina.2010.163 dblp:conf/aina/RidzuanPTS10 fatcat:klgbf6lorrfunbspfplqhshr2q

Toward spam 2.0: An evaluation of Web 2.0 anti-spam methods

Pedram Hayati, Vidyasagar Potdar
2009 2009 7th IEEE International Conference on Industrial Informatics  
This paper presents analysis of current antispam methods in Web 2.0 for spam detection and prevention against our proposed evaluation framework.  ...  The framework is a comprehensive framework to evaluate anti-spam methods from different perspectives.  ...  Posting new threads in online forums Online forums are type of Web 2.0 applications for holding discussion and comments of users. Forums can also be utilized by spammers to distribute spam content.  ... 
doi:10.1109/indin.2009.5195918 fatcat:sgi4a53jobe4xb52bb7cerblea

Spam 2.0 State of the Art

Pedram Hayati, Vidyasagar Potdar
2012 International Journal of Digital Crime and Forensics  
A fake eye-catching profile in social networking websites, a promotional review, a response to a thread in online forums with unsolicited content, or a manipulated Wiki page are examples of Spam 2.0.  ...  Spam 2.0 is defined as the propagation of unsolicited, anonymous, mass content to infiltrate legitimate Web 2.0 applications.  ...  Spam 2.0 in web discussion forums.  ... 
doi:10.4018/jdcf.2012010102 fatcat:244v55izczeazidra3ayzqt2le

Spam 2.0

Vidyasagar Potdar, Farida Ridzuan, Jaipal Singh
2012 Proceedings of the CUBE International Information Technology Conference on - CUBE '12  
From a monetary perspective, estimating intangible costs associated with Spam 2.0 will help raise the awareness of public users regarding spamming.  ...  In this section, we will provide a high level overview of Spam 2.0. We will define Spam 2.0 and demonstrate how serious this problem is.  ...  Intangible costs With the cloud services increasing in popularity, the cost of storage for keeping spam will decrease significantly.  ... 
doi:10.1145/2381716.2381855 dblp:conf/cube/PotdarRS12 fatcat:ch3tjoob4bbdrin27536dap6sm

Big graph mining for the web and social media

U. Kang, Leman Akoglu, Duen Horng Chau
2014 Proceedings of the 7th ACM international conference on Web search and data mining - WSDM '14  
Graphs are everywhere in our lives: social networks, the World Wide Web, biological networks, and many more. These graphs are growing at unprecedented rate, now exceeding billions of nodes and edges.  ...  And what kind of real-world problems, associated with the Web and social media, can we solve with such tools? These are exactly the goals of this tutorial.  ...  Her research interests are in data mining, machine learning, and applied statistics with a focus on pattern mining, and anomaly and event detection in large dynamic data using graph mining and compression  ... 
doi:10.1145/2556195.2556198 dblp:conf/wsdm/KangAC14 fatcat:fbe7ciirlzd3xm42h3y67bw77i

Detection of near-duplicate user generated contents

Enrique Vallés, Paolo Rosso
2011 Proceedings of the 3rd international workshop on Search and mining user-generated contents - SMUC '11  
Today, the number of spam text messages has grown in number, mainly because companies are looking for free advertising.  ...  The identification of spam text messages is a very hard and time-consuming task and it involves to carefully scanning hundreds of text messages.  ...  Nearduplicate Web pages are detected followed by the storage of crawled Web pages into repositories.  ... 
doi:10.1145/2065023.2065031 dblp:conf/cikm/VallesR11 fatcat:wnjpgxealjfgvhhf4f37edrpiu

Protecting Web 2.0 Services from Botnet Exploitations

Nguyen H. Vo, Josef Pieprzyk
2010 2010 Second Cybercrime and Trustworthy Computing Workshop  
This will be discussed further in Chapter 6, where we describe our experiments on a popular existing Web 2.0 botnet.  ...  Cost Effective: as Web 2.0 services are leveraged to function as C&C servers and temporary storages of stolen information, the botmasters can save money and efforts from hiring or setting up their  ... 
doi:10.1109/ctc.2010.10 fatcat:cfoopseg4vc3lf7sfd2twrmfoy

Online Survey Tools: Ethical and Methodological Concerns of Human Research Ethics Committees

Elizabeth A. Buchanan, Erin E. Hvizdak
2009 Journal of Empirical Research on Human Research Ethics  
A SURVEY OF 750 UNIVERSITY HUMAN Research Ethics Boards (HRECs) in the United States revealed that Internet research protocols involving online or Web surveys are the type most often reviewed (94% of respondents  ...  The paper concludes with considerations and suggestions towards consistent protocol review of online surveys to ensure appropriate human subjects protections in the face of emergent electronic tools and  ...  She presented on the topic of online survey research at the Association of Internet Researchers annual conference in Copenhagen, Denmark, and is currently a fellow in the International Society of Ethics  ... 
doi:10.1525/jer.2009.4.2.37 pmid:19480590 fatcat:vqjpeo3zcvgizkoatjqhu6b3pm


Ms.AmiShaileshkumar Desai, Dr.Sanjay Buch
2016 International Journal of Advanced Research  
Generally Web services managed by more than one stake holders. In this review we discuss the security testing methods as well as model issues of web services.  ...  About 80% of transaction done through online web services, but it is not safe or reliable.  ...  All service oriented web sites based on web 2.0 standards and SOA.  ... 
doi:10.21474/ijar01/2340 fatcat:gad6lkpuifbf3e7ccu65rtrrq4

Baltimore SPARC IR and SUN PASIG Meetings

Carol Minton Morris
2009 D-Lib Magazine  
Only 53% of grantees thought that early posting on a government web site was a good idea, because an invention could be prematurely disclosed and scholarly journals view web site postings as a form of  ...  "Cloud" storage could be an economic win especially if facilities are located where energy costs are low.  ... 
doi:10.1045/january2009-morris fatcat:ayj65p65sfegpbr3tor3fdaaou

Spam Detection using Recurrent Neural Networks

2020 International journal for research in engineering application & management  
The main issue of spam is that it can download malicious files which can attack the computers, smart phones and networks, utilize network bandwidth and storage space, degrades email servers and can cause  ...  In order to overcome such drawbacks, an efficient spam detection using recurrent neural networks using the BiGRU model has been proposed.  ...  The word "spam" is used in associated abuses in other broadcastings like instant messaging, newsgroup, web search engine, blogs, Wikipedia, online classified ads, mobile phone messaging, internet forum  ... 
doi:10.35291/2454-9150.2020.0305 fatcat:g5jt3bhxezbhdeclxq5zivols4

ATG Special Report -- Collaboration and Context: Wikis in the Workplace

Keith Engwall, Steve McKinzie
2013 Against the Grain  
This wiki served as a faculty forum for discussion about campus learning spaces and as a place for faculty conference attendees to share what they learned.  ...  We are investigating ways in which we can encourage other staff to experiment with the wiki. The primary cost of implementing a wiki is the time and expertise involved in the initial set-up.  ... 
doi:10.7771/2380-176x.2708 fatcat:woiq42r3nvfr7fe4u372p5wbom

Quality of Service [chapter]

2010 Net Neutrality  
This model not only makes bottleneck control much easier, but also prevents some of the interoperability and open access for users that has led to much Web 2.0 innovation for businesses.  ...  The increasing cost-effi ciency of fi le distribution is predicted to continue, but the increased storage costeffi ciency of multimedia-ready PCs and PVRs is likely to be the biggest change in consumers  ... 
doi:10.5040/ fatcat:dwfic52tcrcxhdvrwyyi32mp3e

From Spin to Spam: promises and limits of Web 2.0 campaigning in Britain

Géraldine Castel
2010 Observatoire de la société britannique  
of data, ease of access and an exponential storage capacity.  ...  to accommodate a larger range of issues, from the crucial to the trivial in a more engaging framework through a blend of texts, images, audio and video documents. 11 What Web 2.0 added was the opportunity  ... 
doi:10.4000/osb.1039 fatcat:zu3eilr67jd6piwmtilrxies6m

Difference and Dependence among Digital Workers: The Case of Amazon Mechanical Turk

L. Irani
2015 The South Atlantic Quarterly  
This variety of backgrounds, skills, and languages benefits employers running surveys, commissioning web articles, virtualizing focus groups, getting translations, and sorting permissible web 2.0 content  ...  Tens of thousands of workers congregate on two major worker-run web forums in which workers share advice with one another, negotiate the norms of work (Martin et al. 2014) , and struggle to establish  ... 
doi:10.1215/00382876-2831665 fatcat:fngkglivjnd6tc23uxwrjwd42y
« Previous Showing results 1 — 15 out of 659 results