A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Key Parameters in Identifying Cost of Spam 2.0
2010
2010 24th IEEE International Conference on Advanced Information Networking and Applications
This paper aims to provide an analytical view in estimating the cost of Spam 2.0. For this purpose, the authors define the web spam lifecycle and its associated impact. ...
Ongoing research in developing honey spam is also presented in this paper. Keywords-component; web spam, cost of spam I. ...
In this case, storage cost as defined in equation 1 has to be paid by the content provider. Storage cost is wasted for spam content. Hence, there is a need for someone to manage this forum or blog. ...
doi:10.1109/aina.2010.163
dblp:conf/aina/RidzuanPTS10
fatcat:klgbf6lorrfunbspfplqhshr2q
Toward spam 2.0: An evaluation of Web 2.0 anti-spam methods
2009
2009 7th IEEE International Conference on Industrial Informatics
This paper presents analysis of current antispam methods in Web 2.0 for spam detection and prevention against our proposed evaluation framework. ...
The framework is a comprehensive framework to evaluate anti-spam methods from different perspectives. ...
Posting new threads in online forums Online forums are type of Web 2.0 applications for holding discussion and comments of users. Forums can also be utilized by spammers to distribute spam content. ...
doi:10.1109/indin.2009.5195918
fatcat:sgi4a53jobe4xb52bb7cerblea
Spam 2.0 State of the Art
2012
International Journal of Digital Crime and Forensics
A fake eye-catching profile in social networking websites, a promotional review, a response to a thread in online forums with unsolicited content, or a manipulated Wiki page are examples of Spam 2.0. ...
Spam 2.0 is defined as the propagation of unsolicited, anonymous, mass content to infiltrate legitimate Web 2.0 applications. ...
Spam 2.0 in web discussion forums. ...
doi:10.4018/jdcf.2012010102
fatcat:244v55izczeazidra3ayzqt2le
From a monetary perspective, estimating intangible costs associated with Spam 2.0 will help raise the awareness of public users regarding spamming. ...
In this section, we will provide a high level overview of Spam 2.0. We will define Spam 2.0 and demonstrate how serious this problem is. ...
Intangible costs With the cloud services increasing in popularity, the cost of storage for keeping spam will decrease significantly. ...
doi:10.1145/2381716.2381855
dblp:conf/cube/PotdarRS12
fatcat:ch3tjoob4bbdrin27536dap6sm
Big graph mining for the web and social media
2014
Proceedings of the 7th ACM international conference on Web search and data mining - WSDM '14
Graphs are everywhere in our lives: social networks, the World Wide Web, biological networks, and many more. These graphs are growing at unprecedented rate, now exceeding billions of nodes and edges. ...
And what kind of real-world problems, associated with the Web and social media, can we solve with such tools? These are exactly the goals of this tutorial. ...
Her research interests are in data mining, machine learning, and applied statistics with a focus on pattern mining, and anomaly and event detection in large dynamic data using graph mining and compression ...
doi:10.1145/2556195.2556198
dblp:conf/wsdm/KangAC14
fatcat:fbe7ciirlzd3xm42h3y67bw77i
Detection of near-duplicate user generated contents
2011
Proceedings of the 3rd international workshop on Search and mining user-generated contents - SMUC '11
Today, the number of spam text messages has grown in number, mainly because companies are looking for free advertising. ...
The identification of spam text messages is a very hard and time-consuming task and it involves to carefully scanning hundreds of text messages. ...
Nearduplicate Web pages are detected followed by the storage of crawled Web pages into repositories. ...
doi:10.1145/2065023.2065031
dblp:conf/cikm/VallesR11
fatcat:wnjpgxealjfgvhhf4f37edrpiu
Protecting Web 2.0 Services from Botnet Exploitations
2010
2010 Second Cybercrime and Trustworthy Computing Workshop
This will be discussed further in Chapter 6, where we describe our experiments on a popular existing Web 2.0 botnet. ...
Cost Effective: as Web 2.0 services are leveraged to function as C&C servers
and temporary storages of stolen information, the botmasters can save money
and efforts from hiring or setting up their ...
doi:10.1109/ctc.2010.10
fatcat:cfoopseg4vc3lf7sfd2twrmfoy
Online Survey Tools: Ethical and Methodological Concerns of Human Research Ethics Committees
2009
Journal of Empirical Research on Human Research Ethics
A SURVEY OF 750 UNIVERSITY HUMAN Research Ethics Boards (HRECs) in the United States revealed that Internet research protocols involving online or Web surveys are the type most often reviewed (94% of respondents ...
The paper concludes with considerations and suggestions towards consistent protocol review of online surveys to ensure appropriate human subjects protections in the face of emergent electronic tools and ...
She presented on the topic of online survey research at the Association of Internet Researchers annual conference in Copenhagen, Denmark, and is currently a fellow in the International Society of Ethics ...
doi:10.1525/jer.2009.4.2.37
pmid:19480590
fatcat:vqjpeo3zcvgizkoatjqhu6b3pm
COMPARATIVE STUDY OF TESTING METHOD AND TOOLS FOR WEB SITES
2016
International Journal of Advanced Research
Generally Web services managed by more than one stake holders. In this review we discuss the security testing methods as well as model issues of web services. ...
About 80% of transaction done through online web services, but it is not safe or reliable. ...
All service oriented web sites based on web 2.0 standards and SOA. ...
doi:10.21474/ijar01/2340
fatcat:gad6lkpuifbf3e7ccu65rtrrq4
Baltimore SPARC IR and SUN PASIG Meetings
2009
D-Lib Magazine
Only 53% of grantees thought that early posting on a government web site was a good idea, because an invention could be prematurely disclosed and scholarly journals view web site postings as a form of ...
"Cloud" storage could be an economic win especially if facilities are located where energy costs are low. ...
doi:10.1045/january2009-morris
fatcat:ayj65p65sfegpbr3tor3fdaaou
Spam Detection using Recurrent Neural Networks
2020
International journal for research in engineering application & management
The main issue of spam is that it can download malicious files which can attack the computers, smart phones and networks, utilize network bandwidth and storage space, degrades email servers and can cause ...
In order to overcome such drawbacks, an efficient spam detection using recurrent neural networks using the BiGRU model has been proposed. ...
The word "spam" is used in associated abuses in other broadcastings like instant messaging, newsgroup, web search engine, blogs, Wikipedia, online classified ads, mobile phone messaging, internet forum ...
doi:10.35291/2454-9150.2020.0305
fatcat:g5jt3bhxezbhdeclxq5zivols4
ATG Special Report -- Collaboration and Context: Wikis in the Workplace
2013
Against the Grain
This wiki served as a faculty forum for discussion about campus learning spaces and as a place for faculty conference attendees to share what they learned. ...
We are investigating ways in which we can encourage other staff to experiment with the wiki. The primary cost of implementing a wiki is the time and expertise involved in the initial set-up. ...
doi:10.7771/2380-176x.2708
fatcat:woiq42r3nvfr7fe4u372p5wbom
Quality of Service
[chapter]
2010
Net Neutrality
This model not only makes bottleneck control much easier, but also prevents some of the interoperability and open access for users that has led to much Web 2.0 innovation for businesses. ...
The increasing cost-effi ciency of fi le distribution is predicted to continue, but the increased storage costeffi ciency of multimedia-ready PCs and PVRs is likely to be the biggest change in consumers ...
doi:10.5040/9781849662192.ch-002
fatcat:dwfic52tcrcxhdvrwyyi32mp3e
From Spin to Spam: promises and limits of Web 2.0 campaigning in Britain
2010
Observatoire de la société britannique
of data, ease of access and an exponential storage capacity. ...
to accommodate a larger range of issues, from the crucial to the trivial in a more engaging framework through a blend of texts, images, audio and video documents.
11 What Web 2.0 added was the opportunity ...
doi:10.4000/osb.1039
fatcat:zu3eilr67jd6piwmtilrxies6m
Difference and Dependence among Digital Workers: The Case of Amazon Mechanical Turk
2015
The South Atlantic Quarterly
This variety of backgrounds, skills, and languages benefits employers running surveys, commissioning web articles, virtualizing focus groups, getting translations, and sorting permissible web 2.0 content ...
Tens of thousands of workers congregate on two major worker-run web forums in which workers share advice with one another, negotiate the norms of work (Martin et al. 2014) , and struggle to establish ...
doi:10.1215/00382876-2831665
fatcat:fngkglivjnd6tc23uxwrjwd42y
« Previous
Showing results 1 — 15 out of 659 results