Spammer and hacker, two old friends
Spammers are always looking for new ways to bypass filters and spread spam content. Currently, spammers have not only improved their spam methods but have also moved towards exploiting software security vulnerabilities in order to spread their spam content. Spammers use weaknesses inside web applica...
| Main Authors: | Hayati, Pedram, Potdar, Vidyasagar |
|---|---|
| Other Authors: | Okyay Kaynak |
| Format: | Conference Paper |
| Published: |
IEEE
2009
|
| Online Access: | http://hdl.handle.net/20.500.11937/43296 |
Similar Items
How much money do spammers make from your website?
by: Hayati, P., et al.
Published: (2012)
by: Hayati, P., et al.
Published: (2012)
Time Hackers
by: Elliot, Ron
Published: (2008)
by: Elliot, Ron
Published: (2008)
Implementing honeypots to fight spammers / Mohd Saiful Abd Talib
by: Abd Talib, Mohd Saiful
Published: (2005)
by: Abd Talib, Mohd Saiful
Published: (2005)
Toward spam 2.0: an evaluation of web 2.0 anti-spam methods
by: Hayati, Pedram, et al.
Published: (2009)
by: Hayati, Pedram, et al.
Published: (2009)
Spam 2.0 state of the art
by: Hayati, Pedram, et al.
Published: (2013)
by: Hayati, Pedram, et al.
Published: (2013)
Evaluation of spam detection and prevention frameworks for email and image spam - a state of art
by: Hayati, Pedram, et al.
Published: (2008)
by: Hayati, Pedram, et al.
Published: (2008)
User-Generated Captions: From Hackers, to the Disability Digerati, to Fansubbers
by: Kent, Michael, et al.
Published: (2017)
by: Kent, Michael, et al.
Published: (2017)
German writers remember 9/11: Katharina Hacker’s "The Have-Nots"
by: Meyer, Franziska
Published: (2014)
by: Meyer, Franziska
Published: (2014)
Major issues in the development of a Hacker's Code of Ethics / Ahmad Hafidz Baharom Alam Shah
by: Baharom Alam Shah, Ahmad Hafidz
Published: (2005)
by: Baharom Alam Shah, Ahmad Hafidz
Published: (2005)
HoneySpam 2.0: profiling web spambot behaviour
by: Hayati, Pedram, et al.
Published: (2009)
by: Hayati, Pedram, et al.
Published: (2009)
Automatically measuring the quality of user generated content in forums
by: Chai, Kevin, et al.
Published: (2011)
by: Chai, Kevin, et al.
Published: (2011)
Rule-Based On-the-fly Web Spambot Detection Using Action Strings
by: Hayati, Pedram, et al.
Published: (2010)
by: Hayati, Pedram, et al.
Published: (2010)
Characterisation of web spambots using self organising maps
by: Hayati, Pedram, et al.
Published: (2011)
by: Hayati, Pedram, et al.
Published: (2011)
Behaviour-Based Web Spambot Detection by Utilising Action Time and Action Frequency
by: Hayati, Pedram, et al.
Published: (2010)
by: Hayati, Pedram, et al.
Published: (2010)
Web Spambot Detection Based on Web Navigation Behaviour
by: Hayati, Pedram, et al.
Published: (2010)
by: Hayati, Pedram, et al.
Published: (2010)
Assessing Post Usage for Measuring the Quality of Forum Posts
by: Chai, Kevin, et al.
Published: (2010)
by: Chai, Kevin, et al.
Published: (2010)
Spam 2.0 state of the art
by: Hayati, P., et al.
Published: (2012)
by: Hayati, P., et al.
Published: (2012)
Definition of Spam 2.0: New Spamming Boom
by: Hayati, Pedram, et al.
Published: (2010)
by: Hayati, Pedram, et al.
Published: (2010)
Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Spam 2.0: The Problem Ahead
by: Potdar, Vidyasagar, et al.
Published: (2010)
by: Potdar, Vidyasagar, et al.
Published: (2010)
Computer Crimes Act 1997 v Computer Misuse Act 1993: the effectiveness in curbing hackers / Effa Suzieana Zainal, Nor Haslina Ismail and Nur Asyikin Mansoor.
by: Zainal, Effa Suzieana, et al.
Published: (2007)
by: Zainal, Effa Suzieana, et al.
Published: (2007)
Two Close Friends Fulfil Their Dreams to Enroll at UMPSA
by: Nor Salwana, Mohammad Idris
Published: (2023)
by: Nor Salwana, Mohammad Idris
Published: (2023)
Preface
by: Potdar, Vidyasagar
Published: (2011)
by: Potdar, Vidyasagar
Published: (2011)
Improving RFID read rate reliability by a systemic error detection approach
by: Potdar, Vidyasagar, et al.
Published: (2007)
by: Potdar, Vidyasagar, et al.
Published: (2007)
Factors that influence vocabulary development in two-year-old children
by: Stokes, Stephanie F., et al.
Published: (2009)
by: Stokes, Stephanie F., et al.
Published: (2009)
Applications for RFID in pharmaceutical industry
by: Potdar, M., et al.
Published: (2006)
by: Potdar, M., et al.
Published: (2006)
Spamming for science: Active measurement in web 2.0 abuse research
by: West, A., et al.
Published: (2012)
by: West, A., et al.
Published: (2012)
Addressing the new generation of spam (Spam 2.0) through Web usage models
by: Hayati, Pedram
Published: (2011)
by: Hayati, Pedram
Published: (2011)
Alveolar rhabdomyosarcoma of the neck in a two-months-old baby: diagnostic challenges
by: Nordashima Abd Shukor,, et al.
Published: (2019)
by: Nordashima Abd Shukor,, et al.
Published: (2019)
Anatomical and physical properties of cultivated two- and four-year-old bambusa vulgaris
by: Razak Wahab,, et al.
Published: (2010)
by: Razak Wahab,, et al.
Published: (2010)
Blocking online advertising - a state of the art
by: Singh, A., et al.
Published: (2009)
by: Singh, A., et al.
Published: (2009)
A review of opinion mining and sentiment classification framework in social networks
by: Lo, Yee, et al.
Published: (2009)
by: Lo, Yee, et al.
Published: (2009)
Innovative business models for E-learning entrepreneurs
by: Sambhanthan, A., et al.
Published: (2017)
by: Sambhanthan, A., et al.
Published: (2017)
Organisations' responsibilities towards corporate sustinability: A content analysis of literature
by: Sambhanthan, A., et al.
Published: (2017)
by: Sambhanthan, A., et al.
Published: (2017)
Waste management strategies for Software Development companies: An explorative text analysis of business sustainability reports
by: Sambhanthan, A., et al.
Published: (2016)
by: Sambhanthan, A., et al.
Published: (2016)
Business sustainability frameworks a survey
by: Sambhanthan, A., et al.
Published: (2016)
by: Sambhanthan, A., et al.
Published: (2016)
A survey of Western Australian Software Businesses an exlporative web content analysis
by: Sambhanthan, A., et al.
Published: (2016)
by: Sambhanthan, A., et al.
Published: (2016)
Torpid Mode: Hybrid of Sleep and Idle Mode as Power Saving Mechanism for IEEE 802.16j
by: Singh, Ashish, et al.
Published: (2010)
by: Singh, Ashish, et al.
Published: (2010)
State of the Art: Carbon Emission Accountability Modeling
by: Lo, Valencia, et al.
Published: (2010)
by: Lo, Valencia, et al.
Published: (2010)
Green Business Practices for Software Development Companies: An Explorative Text Analysis of Business Sustainability Reports
by: Sambhanthan, A., et al.
Published: (2015)
by: Sambhanthan, A., et al.
Published: (2015)
Similar Items
-
How much money do spammers make from your website?
by: Hayati, P., et al.
Published: (2012) -
Time Hackers
by: Elliot, Ron
Published: (2008) -
Implementing honeypots to fight spammers / Mohd Saiful Abd Talib
by: Abd Talib, Mohd Saiful
Published: (2005) -
Toward spam 2.0: an evaluation of web 2.0 anti-spam methods
by: Hayati, Pedram, et al.
Published: (2009) -
Spam 2.0 state of the art
by: Hayati, Pedram, et al.
Published: (2013)