Rule-Based On-the-fly Web Spambot Detection Using Action Strings
Web spambots are a new type of internet robot that spread spam content through Web 2.0 applications like online discussion boards, blogs, wikis, social networking platforms etc. These robots are intelligently designed to act like humans in order to fool safeguards and other users. Such spam content...
| Main Authors: | Hayati, Pedram, Potdar, Vidyasagar, Talevski, Alex, Smyth, William |
|---|---|
| Other Authors: | D Sculley |
| Format: | Conference Paper |
| Published: |
CEAS
2010
|
| Online Access: | http://hdl.handle.net/20.500.11937/39924 |
Similar Items
Behaviour-Based Web Spambot Detection by Utilising Action Time and Action Frequency
by: Hayati, Pedram, et al.
Published: (2010)
by: Hayati, Pedram, et al.
Published: (2010)
Web Spambot Detection Based on Web Navigation Behaviour
by: Hayati, Pedram, et al.
Published: (2010)
by: Hayati, Pedram, et al.
Published: (2010)
Characterisation of web spambots using self organising maps
by: Hayati, Pedram, et al.
Published: (2011)
by: Hayati, Pedram, et al.
Published: (2011)
HoneySpam 2.0: profiling web spambot behaviour
by: Hayati, Pedram, et al.
Published: (2009)
by: Hayati, Pedram, et al.
Published: (2009)
Toward spam 2.0: an evaluation of web 2.0 anti-spam methods
by: Hayati, Pedram, et al.
Published: (2009)
by: Hayati, Pedram, et al.
Published: (2009)
Key Parameters in Identifying Cost of Spam 2.0
by: Ridzuan, Farida, et al.
Published: (2010)
by: Ridzuan, Farida, et al.
Published: (2010)
Computing regularities in strings
by: Smyth, William, et al.
Published: (2009)
by: Smyth, William, et al.
Published: (2009)
Evaluation of spam detection and prevention frameworks for email and image spam - a state of art
by: Hayati, Pedram, et al.
Published: (2008)
by: Hayati, Pedram, et al.
Published: (2008)
Web of things as a framework for ubiquitous intelligence and computing
by: Dillon, Tharam S., et al.
Published: (2009)
by: Dillon, Tharam S., et al.
Published: (2009)
Assessing Post Usage for Measuring the Quality of Forum Posts
by: Chai, Kevin, et al.
Published: (2010)
by: Chai, Kevin, et al.
Published: (2010)
Fast pattern-matching on indeterminate strings
by: Holub, J., et al.
Published: (2008)
by: Holub, J., et al.
Published: (2008)
Definition of Spam 2.0: New Spamming Boom
by: Hayati, Pedram, et al.
Published: (2010)
by: Hayati, Pedram, et al.
Published: (2010)
How many runs can a string contain?
by: Puglisi, S., et al.
Published: (2008)
by: Puglisi, S., et al.
Published: (2008)
Spam 2.0 state of the art
by: Hayati, Pedram, et al.
Published: (2013)
by: Hayati, Pedram, et al.
Published: (2013)
Spammer and hacker, two old friends
by: Hayati, Pedram, et al.
Published: (2009)
by: Hayati, Pedram, et al.
Published: (2009)
Fast, Practical Algorithms for Computing All the Repeats in a String
by: Puglisi, Simon, et al.
Published: (2010)
by: Puglisi, Simon, et al.
Published: (2010)
Spam 2.0: The Problem Ahead
by: Potdar, Vidyasagar, et al.
Published: (2010)
by: Potdar, Vidyasagar, et al.
Published: (2010)
A Middleware for Mobile and Ubiquitous Learning Ecosystems Based on a Reconfigurable Plug-and-Play Architecture: Application to Mashups
by: Martin, S., et al.
Published: (2010)
by: Martin, S., et al.
Published: (2010)
Sorting suffixes of two-pattern strings
by: Franek, F., et al.
Published: (2004)
by: Franek, F., et al.
Published: (2004)
Factors Involved in Estimating Cost of Email Spam
by: Ridzuan, Farida, et al.
Published: (2010)
by: Ridzuan, Farida, et al.
Published: (2010)
A new approach to the periodicity lemma on strings with holes
by: Smyth, Bill, et al.
Published: (2009)
by: Smyth, Bill, et al.
Published: (2009)
An adaptive hybrid pattern-matching algorithm on indeterminate strings
by: Smyth, Bill, et al.
Published: (2009)
by: Smyth, Bill, et al.
Published: (2009)
n-cutting site of DNA splicing language for single string and palindromic rule
by: Nooradelena, Mohd Ruslim, et al.
Published: (2022)
by: Nooradelena, Mohd Ruslim, et al.
Published: (2022)
An adaptive hybrid pattern-matching algorithm on indeterminate strings
by: Smyth, Bill, et al.
Published: (2008)
by: Smyth, Bill, et al.
Published: (2008)
Impact of Encryption on Qos in Voip
by: Radmand, Pedram, et al.
Published: (2010)
by: Radmand, Pedram, et al.
Published: (2010)
Strings
by: Soomro, Waseem Javaid, et al.
Published: (2011)
by: Soomro, Waseem Javaid, et al.
Published: (2011)
Fast optimal algorithms for computing all the repeats in a string
by: Puglisi, Simon, et al.
Published: (2008)
by: Puglisi, Simon, et al.
Published: (2008)
Paraphrase Detection using String Similarity with Synonyms
by: Lee, Jun Choi, et al.
Published: (2015)
by: Lee, Jun Choi, et al.
Published: (2015)
User contribution measurement model for web-based discussion forums
by: Chai, Kevin, et al.
Published: (2009)
by: Chai, Kevin, et al.
Published: (2009)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Spamming for science: Active measurement in web 2.0 abuse research
by: West, A., et al.
Published: (2012)
by: West, A., et al.
Published: (2012)
Automatically measuring the quality of user generated content in forums
by: Chai, Kevin, et al.
Published: (2011)
by: Chai, Kevin, et al.
Published: (2011)
A survey of Western Australian Software Businesses an exlporative web content analysis
by: Sambhanthan, A., et al.
Published: (2016)
by: Sambhanthan, A., et al.
Published: (2016)
Addressing the new generation of spam (Spam 2.0) through Web usage models
by: Hayati, Pedram
Published: (2011)
by: Hayati, Pedram
Published: (2011)
Improving RFID read rate reliability by a systemic error detection approach
by: Potdar, Vidyasagar, et al.
Published: (2007)
by: Potdar, Vidyasagar, et al.
Published: (2007)
Web Service Integration in the Extended Logistics Enterprise
by: Talevski, Alex, et al.
Published: (2003)
by: Talevski, Alex, et al.
Published: (2003)
Seven-part string
by: Kerr, Thor
Published: (2021)
by: Kerr, Thor
Published: (2021)
Methods of string class
by: Soomro, Waseem Javaid, et al.
Published: (2011)
by: Soomro, Waseem Javaid, et al.
Published: (2011)
Emotion detection state of the art
by: Binali, Haji, et al.
Published: (2012)
by: Binali, Haji, et al.
Published: (2012)
Similar Items
-
Behaviour-Based Web Spambot Detection by Utilising Action Time and Action Frequency
by: Hayati, Pedram, et al.
Published: (2010) -
Web Spambot Detection Based on Web Navigation Behaviour
by: Hayati, Pedram, et al.
Published: (2010) -
Characterisation of web spambots using self organising maps
by: Hayati, Pedram, et al.
Published: (2011) -
HoneySpam 2.0: profiling web spambot behaviour
by: Hayati, Pedram, et al.
Published: (2009) -
Toward spam 2.0: an evaluation of web 2.0 anti-spam methods
by: Hayati, Pedram, et al.
Published: (2009)