Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("SPAMS")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 171

  • Page / 7
Export

Selection :

  • and

Efficient and effective spam filtering and re-ranking for large web datasetsCORMACK, Gordon V; SMUCKER, Mark D; CLARKE, Charles L. A et al.Information retrieval (Boston). 2011, Vol 14, Num 5, pp 441-465, issn 1386-4564, 25 p.Article

Content-based analysis to detect Arabic web spamAL-KABI, Mohammed; WAHSHEH, Heider; ALSMADI, Izzat et al.Journal of information science. 2012, Vol 38, Num 3, pp 284-296, issn 0165-5515, 13 p.Article

The ethical status of non-commercial spamROOKSBY, Emma.Ethics and information technology. 2007, Vol 9, Num 2, pp 141-152, issn 1388-1957, 12 p.Article

Detecting spam blogs from blog search resultsLINHONG ZHU; AIXIN SUN; CHOI, Byron et al.Information processing & management. 2011, Vol 47, Num 2, pp 246-262, issn 0306-4573, 17 p.Article

A memory-based approach to anti-spam filtering for mailing listsSAKKIS, Georgios; ANDROUTSOPOULOS, Ion; PALIOURAS, Georgios et al.Information retrieval (Boston). 2003, Vol 6, Num 1, pp 49-73, issn 1386-4564, 25 p.Article

Conditional validity of inductive conformal predictorsVOVK, Vladimir.Machine learning. 2013, Vol 92, Num 2-3, pp 349-376, issn 0885-6125, 28 p.Article

Email from nancy nutsucker : Representation and gendered address in online pornography = Un mail de nancy 'nutsucker' : représentation et adresse genrée dans la pornographie en lignePAASONEN, Susanna.European journal of cultural studies (Print). 2006, Vol 9, Num 4, pp 403-420, issn 1367-5494, 18 p.Article

Online behaviors affected by spam = Comportements en lignes affectés par les spamsGRIMES, Galen A.Social science computer review. 2006, Vol 24, Num 4, pp 507-515, issn 0894-4393, 9 p.Article

Extended DMTP: A new protocol for improved graylist categorizationJIE YANG; LIU, Hai-Tao; ZHANG, Zu-Ping et al.Computers & security. 2014, Vol 40, pp 75-83, issn 0167-4048, 9 p.Article

Comparing commercial IP reputation databases to open-source IP reputation algorithmsPORENTA, Jernej; CIGLARIC, Mojca.Computer systems science and engineering. 2013, Vol 28, Num 1, pp 53-66, issn 0267-6192, 14 p.Article

Detecting spamming activities in a campus network using incremental learningJUIHSI FU; POCHING LIN; SINGLING LEE et al.Journal of network and computer applications. 2014, Vol 43, pp 56-65, issn 1084-8045, 10 p.Article

SpamED : A Spam E-Mail Detection Approach Based on Phrase SimilaritySOLEDAD PERA, Maria; NQ, Yiu-Kai.Journal of the American Society for Information Science and Technology (Print). 2009, Vol 60, Num 2, pp 393-409, issn 1532-2882, 17 p.Article

An anti-spam scheme using pre-challengesROMAN, Rodrigo; JIANYING ZHOU; LOPEZ, Javier et al.Computer communications. 2006, Vol 29, Num 15, pp 2739-2749, issn 0140-3664, 11 p.Article

Early filtering of ephemeral malicious accounts on TwitterSANGHO LEE; JONG KIM.Computer communications. 2014, Vol 54, pp 48-57, issn 0140-3664, 10 p.Article

A generic solution for unwanted traffic control through trust managementZHENG YAN; KANTOLA, Raimo; YUE SHEN et al.New review of hypermedia and multimedia. 2014, Vol 20, Num 1, pp 25-51, issn 1361-4568, 27 p.Article

Digital video steganalysis by subtractive prediction error adjacency matrixKEREN WANG; JIESI HAN; HONGXIA WANG et al.Multimedia tools and applications. 2014, Vol 72, Num 1, pp 313-330, issn 1380-7501, 18 p.Article

Empirical Evaluation and New Design for Fighting Evolving Twitter SpammersCHAO YANG; HARKREADER, Robert; GUOFEI GU et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 7-8, pp 1280-1293, issn 1556-6013, 14 p.Article

A generic statistical approach for spam detection in Online Social NetworksAHMED, Faraz; ABULAISH, Muhammad.Computer communications. 2013, Vol 36, Num 10-11, pp 1120-1129, issn 0140-3664, 10 p.Article

Stable web spam detection using features based on lexical itemsLUCKNER, Marcin; GAD, Michał; SOBKOWIAK, Paweł et al.Computers & security. 2014, Vol 46, pp 79-93, issn 0167-4048, 15 p.Article

Video spam and public opinion in current Middle Eastern conflictsALSMADI, Izzat; AL-KABI, Mohammed Naji; WAHSHEH, Heider et al.International journal of social network mining (Print). 2013, Vol 1, Num 3-4, pp 318-333, issn 1757-8485, 16 p.Article

A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authenticationSOUPIONIS, Yannis; KOUTSIAMANIS, Remous-Aris; EFRAIMIDIS, Pavlos et al.Journal of computer security. 2014, Vol 22, Num 3, pp 383-413, issn 0926-227X, 31 p.Article

Reversing the effects of tokenisation attacks against content-based spam filtersSANTOS, Igor; LAORDEN, Carlos; SANZ, Borja et al.International journal of security and networks (Print). 2013, Vol 8, Num 2, pp 106-116, issn 1747-8405, 11 p.Article

Listen to me — Evaluating the influence of micro-blogsFENG LI; DU, Timon C.Decision support systems. 2014, Vol 62, pp 119-130, issn 0167-9236, 12 p.Article

A metric to detect fault-prone software modules using text filteringMIZUNO, Osamu; HATA, Hideaki.International journal of reliability and safety (Print). 2013, Vol 7, Num 1, pp 17-31, issn 1479-389X, 15 p.Article

Spam : It's not just for inboxes anymoreGYÖNGYI, Zoltan; GARCIA-MOLINA, Hector.Computer (Long Beach, CA). 2005, Vol 38, Num 10, pp 28-34, issn 0018-9162, 7 p.Article

  • Page / 7