Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








33 Hits in 8.4 sec

Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers [chapter]

Chao Yang, Robert Chandler Harkreader, Guofei Gu
2011 Lecture Notes in Computer Science  
In this paper, we make an empirical analysis of the evasion tactics utilized by Twitter spammers, and then design several new and robust features to detect Twitter spammers.  ...  Meanwhile, Twitter spammers are also evolving to evade existing detection techniques.  ...  However, even for a subset of spammers, we can find that they are evolving to evade detection. And our evaluation validates the effectiveness of our newly designed features to detect these spammers.  ... 
doi:10.1007/978-3-642-23644-0_17 fatcat:lpp42si7o5fdfcydcjt3b6dgsu

A Survey of Spam Detection Methods on Twitter

Abdullah Talha, Resul Kara
2017 International Journal of Advanced Computer Science and Applications  
This popularity attracts the attention of spammers who use Twitter for their malicious aims such as phishing legitimate users or spreading malicious software and advertises through URLs shared within tweets  ...  Thus, detecting and filtering spammers from legitimate users are mandatory in order to provide a spam-free environment in Twitter.  ...  Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers" [84] Random Forest, Decision Tree, Decorate, Naive Bayesian Hybrid 88.6% "Detecting spammers on SVM Hybrid 87.6%  ... 
doi:10.14569/ijacsa.2017.080305 fatcat:4hahlp2hpneolndpfa2tbqm2ca

Volume 5, Number 2 Complete Issue

Admin Admin
2009 Socialist Studies/Études Socialistes  
I also thank the other panellists and the audience members for the lively and stimulating discussion on that occasion.  ...  My thanks are due to the anonymous referees for their valuable suggestions.  ...  Twitter may offer itself (for the time being) as a free service whose only (and itself not inconsiderable) cost is access to online or uplinked hardware.  ... 
doi:10.18740/s46k6v fatcat:taszqotztvcsfjuxfzjgvby5li

Unmasking Malignant Facebook Applications - A survey

Geetanjali A N, Arpitha T, Deepti V Bhat, Kavya L R, Kavya M S
2018 NCICCNDA   unpublished
Long term, we see FRAppE as a step towards creating an independent watchdog for app assessment and ranking.  ...  But, cyber criminals have realized the potential of using apps for spreading malware and spam like unsolicited mail.  ...  Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers Yang et al.  ... 
doi:10.21467/proceedings.1.40 fatcat:vlpemqx265baxnjlqbhd5cd4da

Illusion of Truth: Analysing and Classifying COVID-19 Fake News in Brazilian Portuguese Language

Patricia Takako Endo, Guto Leoni Santos, Maria Eduarda de Lima Xavier, Gleyson Rhuan Nascimento Campos, Luciana Conceição de Lima, Ivanovitch Silva, Antonia Egli, Theo Lynn
2022 Big Data and Cognitive Computing  
Public health interventions to counter the COVID-19 pandemic have accelerated and increased digital adoption and use of the Internet for sourcing health information.  ...  The consequences of misinformation, disinformation and misinterpretation of health information can interfere with attempts to curb the virus, delay or result in failure to seek or continue legitimate medical  ...  They argued that "spammers often introduce "noise" in their messages using phrases like "MONEY!!", "FREE!!!" or placing special characters into the words like "R-o-l-e?x"".  ... 
doi:10.3390/bdcc6020036 fatcat:cfrpfwd6tvh5fe5gzfzlnerox4

5. Foundations of Digital Methods Query Design [chapter]

Richard Rogers, Mirko Tobias Schäfer, Karin van Es
2017 The Datafied Society  
Acknowledgements References Berry, David M. 2012 Acknowledgments The author would like to thank Anat Ben-David for her work on query design, and Becky Cachia for editorial assistance.  ...  Michael Stevenson, Erik Borra and researchers at the Digital Methods Initiative, University of Amsterdam, provided crucial input.  ...  That they are taken for granted even today, when they are increasingly displaced by a radically different representational regime and set of technologies, shows us that old habits die hard.  ... 
doi:10.1515/9789048531011-008 fatcat:7q6p2hlrufgndeozrarhkgggca

Discourse 2.0: Language and new mediaTannenDeborahTresterAnna Marie (eds), Discourse 2.0: Language and new media, Georgetown University Press: Washington, DC, 2013; 258 pp.: ISBN 9781589019546, $44.95 (pbk)

Karen Correia Da Silva
2014 New Media & Society  
ACKNOWLEDGMENTS We thank the participants in our study and audience members of our workshop at GURT 2011 for their input and feedback.  ...  Finally, I am grateful to Susan Herring and Anna Marie Trester for helpful comments on an earlier draft.  ...  Whether reading in hard copy is better, worse, or about the same as reading onscreen remains an empirical issue.  ... 
doi:10.1177/1461444814524163b fatcat:lix7m4khk5ep3f7d3ftd3psx3q

Corruption and Financial Crime

Sam Vaknin
2018 Figshare  
Essays about corruption, money laundering, crime, and international finance.  ...  The total indirect damage is hard to evaluate, but the direct damage amounted to 6 billion USD.  ...  It is often said to have perpetual succession, meaning that it lives on, even though the individual members may die, resign or otherwise cease their membership.  ... 
doi:10.6084/m9.figshare.7176539 fatcat:pjcdb2c32vh4fp2rlzx3p6qoke

Digital Market Manipulation

M. Ryan Calo
2013 Social Science Research Network  
A new theory of digital market manipulation reveals the limits of consumer protection law and exposes concrete economic and privacy harms that regulators will be hard-pressed to ignore.  ...  Furthermore, rather than waiting for the consumer to approach the marketplace, companies can reach consumers anytime and anywhere.  ...  such as Facebook, Twitter, and LinkedIn have become arguably indispensable economic, social, and civic tools for many citizens.  ... 
doi:10.2139/ssrn.2309703 fatcat:bxss56x2evhgvnp432vsznblam

OSTP-AWhite House Office of Science and Technology Policy Request for Information on the Future of Artificial Intelligence

Kris Kitchen
2017 Figshare  
White House Office of Science and Technology Policy Request for Information on the Future of Artificial Intelligence  ...  faster than new jobs can be created or workers retrained.  ...  For the long term, we recommend policies that will encourage the designers of transformative AI systems to work together cooperatively, perhaps through multinational and multicorporate collaborations,  ... 
doi:10.6084/m9.figshare.4640305 fatcat:26aelpe4ejbupao5yh2mys2pzq

Net neutrality - How relevant is it to Australia?

James Endres
2009 Telecommunications Journal of Australia  
I would like to thank Derek Slater, Carolyn Dalton, and Rick Whitt at Google for their assistance.  ...  ACKNOWLEDGEMENTS The authors benefited from generous assistance from colleagues and interns including Alana Maurushat, Reg Leones, Adam Arnold and Joanna Chow.  ...  less susceptible to hackers and spammers, or smarter in ways that nobody has yet thought of.  ... 
doi:10.2104/tja09022 fatcat:iyhfeahrmverdoaskclswtokx4

TWITTER AND SOCIETY PETER LANG Library of Congress Cataloging-in-Publication Data

Axel Weller, Jean Burgess, & Merja, Puschmann, Steve Jones, New York, Washington, D Baltimore, Bern, Frankfurt Berlin, Brussels, Vienna (+14 others)
2014 unpublished
Bibliographic information published by Die Deutsche Nationalbibliothek.  ...  Die Deutsche Nationalbibliothek lists this publication in the "Deutsche Nationalbibliografie"; detailed bibliographic data is available on the Internet at http://dnb.d-nb.de/.  ...  r eFer en ce S ChAPTeR ^Miranda Mowbray Automated Twitter Accounts 14 not all #bots are evil: how to distinguish between spammers, entertainers and tweeting #toasters Twitter was designed for communication  ... 
fatcat:qmtuv4tuffb45iv5csnb6p6xw4

The Democratization of News - Analysis and Behavior Modeling of Users in the Context of Online News Consumption

Jan Ludwig Reubold, Thorsten Strufe, Gianluca Stringhini
2023
Die Erfindung des Internets ebnete den Weg für die Demokratisierung von Information.  ...  Dieser Trend hat die Kosten für die Veröffentlichung von Inhalten weiter gesenkt.  ...  [11] collected data from users on Twitter. They manually labeled users as spammers or non-spammers and proposed an SVM classifier for detection.  ... 
doi:10.5445/ir/1000154353 fatcat:msh5vemmhjaxbphe4xw2vgcpva

Incivility and intolerance on Twitter: A case study of political tweets about abortion in Ireland (2018) and the United States (2020)

Dayei Oh
2022
Secondly, I make an empirical-descriptive contribution to research, exploring the Irish and U.S. Twitter data both quantitatively and qualitatively.  ...  ,' or 'uncivil' language in their models.  ...  an empirical research design.  ... 
doi:10.26174/thesis.lboro.19646613.v1 fatcat:mm67nczpifb3vppy2fjazwrgou

Understanding Innovations and Conventions and Their Diffusion Process in Online Social Media

Rahmtin Rotabi
2017
Work in this thesis sheds light on the properties of both innovators and laggards, the expansion and adaptation of innovation, competition among innovations with the same purpose, and the eventual crowding  ...  Prior to the existence of online social networks, economists and sociologists were able to study these phenomena on small groups of people through microeconomics and microsociology.  ...  Empirical Analysis on Twitter In order to analyze audience behavior with cascades, we undertook an empirical investigation on Twitter.  ... 
doi:10.7298/x4xs5sm2 fatcat:uhroprwkfvasvdeu7yfoupwdt4
« Previous Showing results 1 — 15 out of 33 results