Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,279,580 papers from all fields of science
Search
Sign In
Create Free Account
Spamming
Known as:
Ratware
, Electronic spamming
, Spam text
Expand
Electronic spamming is the use of electronic messaging systems to send an unsolicited message (spam), especially advertising, as well as sending…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ARMM (Usenet)
ASCII art
Blackhole exploit kit
Botnet
Expand
Broader (2)
Cybercrime
E-commerce
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2013
Review
2013
Synthetic review spamming and defense
Huan Sun
,
Alex Morales
,
Xifeng Yan
The Web Conference
2013
Corpus ID: 10292904
Online reviews have been popularly adopted in many applications. Since they can either promote or harm the reputation of a…
Expand
Review
2012
Review
2012
Survey on web spam detection: principles and algorithms
N. Spirin
,
Jiawei Han
SKDD
2012
Corpus ID: 221328
Search engines became a de facto place to start information acquisition on the Web. Though due to web spam phenomenon, search…
Expand
Highly Cited
2012
Highly Cited
2012
Eliminating Spammers and Ranking Annotators for Crowdsourced Labeling Tasks
V. Raykar
,
Shipeng Yu
Journal of machine learning research
2012
Corpus ID: 547108
With the advent of crowdsourcing services it has become quite cheap and reasonably effective to get a data set labeled by…
Expand
Highly Cited
2011
Highly Cited
2011
Spam Filtering in Twitter Using Sender-Receiver Relationship
Jonghyuk Song
,
Sangho Lee
,
Jong Kim
International Symposium on Recent Advances in…
2011
Corpus ID: 3818950
Twitter is one of the most visited sites in these days. Twitter spam, however, is constantly increasing. Since Twitter spam is…
Expand
Highly Cited
2010
Highly Cited
2010
Efficient and effective spam filtering and re-ranking for large web datasets
G. Cormack
,
Mark D. Smucker
,
C. Clarke
Information retrieval (Boston)
2010
Corpus ID: 11861526
The TREC 2009 web ad hoc and relevance feedback tasks used a new document collection, the ClueWeb09 dataset, which was crawled…
Expand
Review
2010
Review
2010
An Overview of IP Flow-Based Intrusion Detection
A. Sperotto
,
Gregor Schaffrath
,
R. Sadre
,
C. Morariu
,
A. Pras
,
B. Stiller
IEEE Communications Surveys and Tutorials
2010
Corpus ID: 8364569
Intrusion detection is an important area of research. Traditionally, the approach taken to find attacks is to inspect the…
Expand
Review
2009
Review
2009
Consumer Privacy Concerns and Preference for Degree of Regulatory Control
Shintaro Okazaki
,
Hairong Li
,
M. Hirose
2009
Corpus ID: 55824694
This study explores the consequences of consumers' privacy concerns in the context of mobile advertising. Drawing on social…
Expand
Highly Cited
2008
Highly Cited
2008
Exploiting Machine Learning to Subvert Your Spam Filter
B. Nelson
,
M. Barreno
,
+6 authors
Kai Xia
USENIX Workshop on Large-Scale Exploits and…
2008
Corpus ID: 15667091
Using statistical machine learning for making security decisions introduces new vulnerabilities in large scale systems. This…
Expand
Highly Cited
2001
Highly Cited
2001
Published online:
2001
Corpus ID: 115227571
Highly Cited
2000
Highly Cited
2000
MARS: A Programmable Coordination Architecture for Mobile Agents
Giacomo Cabri
,
L. Leonardi
,
F. Zambonelli
IEEE Internet Computing
2000
Corpus ID: 606621
Mobile agents offer much promise, but agent mobility and Internet openness make coordination more difficult. Mobile Agent…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE