Iterative group-based and difference ranking method for online rating systems with spamming attacks
It is significant to assign reputation scores to users and identify spammers in the bipartite rating networks. In this paper, we propose an Iterative Group-based and Difference Ranking (IGDR) method, which is based on the original Iterative Group-based Ranking (IGR) method. The IGR method considers...
| Main Authors: | Fu, Quan-Yun, Ren, Jian-Feng, Sun, Hong-Liang |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
World Scientific
2021
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/65182/ |
Similar Items
Evaluation of spam detection and prevention frameworks for email and image spam - a state of art
by: Hayati, Pedram, et al.
Published: (2008)
by: Hayati, Pedram, et al.
Published: (2008)
Toward spam 2.0: an evaluation of web 2.0 anti-spam methods
by: Hayati, Pedram, et al.
Published: (2009)
by: Hayati, Pedram, et al.
Published: (2009)
Deep neural networks for spam classification
by: Kasmani, Mohamed Khizer
Published: (2013)
by: Kasmani, Mohamed Khizer
Published: (2013)
Factors Involved in Estimating Cost of Email Spam
by: Ridzuan, Farida, et al.
Published: (2010)
by: Ridzuan, Farida, et al.
Published: (2010)
Key Parameters in Identifying Cost of Spam 2.0
by: Ridzuan, Farida, et al.
Published: (2010)
by: Ridzuan, Farida, et al.
Published: (2010)
Definition of Spam 2.0: New Spamming Boom
by: Hayati, Pedram, et al.
Published: (2010)
by: Hayati, Pedram, et al.
Published: (2010)
The changing nature of spam 2.0
by: Potdar, Vidyasagar, et al.
Published: (2012)
by: Potdar, Vidyasagar, et al.
Published: (2012)
Spam 2.0
by: Potdar, Vidyasagar, et al.
Published: (2012)
by: Potdar, Vidyasagar, et al.
Published: (2012)
Awareness, Knowledge and Perception of Online Spam
by: Mohd Ridzuan, Farida, et al.
Published: (2013)
by: Mohd Ridzuan, Farida, et al.
Published: (2013)
Spam 2.0: The Problem Ahead
by: Potdar, Vidyasagar, et al.
Published: (2010)
by: Potdar, Vidyasagar, et al.
Published: (2010)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
Spam filtering implementation using open source software / Ahmad Bakhtiar Ibrahim
by: Ibrahim, Ahmad Bakhtiar
Published: (2006)
by: Ibrahim, Ahmad Bakhtiar
Published: (2006)
Multilayer perceptrons neural network based web spam detection application
by: Goh, K.L., et al.
Published: (2013)
by: Goh, K.L., et al.
Published: (2013)
Addressing the new generation of spam (Spam 2.0) through Web usage models
by: Hayati, Pedram
Published: (2011)
by: Hayati, Pedram
Published: (2011)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Detecting wormhole and Byzantine attacks in mobile ad hoc networks
by: Alam, Mohammad Rafiqul
Published: (2011)
by: Alam, Mohammad Rafiqul
Published: (2011)
Link-based spam algorithms in adversarial information retrieval
by: Leng, A., et al.
Published: (2012)
by: Leng, A., et al.
Published: (2012)
Name-signature lookup system: a security enhancement to named data networking
by: Song, Zhicheng, et al.
Published: (2021)
by: Song, Zhicheng, et al.
Published: (2021)
Detecting collusive spamming activities in community question answering
by: Liu, Yuli, et al.
Published: (2017)
by: Liu, Yuli, et al.
Published: (2017)
Multi-classifier classification of spam email on a ubiquitous multi-core architecture
by: Islam, Md., et al.
Published: (2008)
by: Islam, Md., et al.
Published: (2008)
An improved game-theoretic approach to uncover overlapping communities
by: Sun, Hong-Liang, et al.
Published: (2017)
by: Sun, Hong-Liang, et al.
Published: (2017)
The identification of influential spreaders and communities in complex networks
by: Sun, Hong-Liang
Published: (2018)
by: Sun, Hong-Liang
Published: (2018)
HoneySpam 2.0: profiling web spambot behaviour
by: Hayati, Pedram, et al.
Published: (2009)
by: Hayati, Pedram, et al.
Published: (2009)
A voting approach to uncover multiple influential spreaders on weighted networks
by: Sun, Hong-liang, et al.
Published: (2019)
by: Sun, Hong-liang, et al.
Published: (2019)
Storage cost of spam 2.0 in a web discussion forum
by: Ridzuan, Farida, et al.
Published: (2011)
by: Ridzuan, Farida, et al.
Published: (2011)
DDOS avoidance strategy for service avalibilty
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
by: Enshaei, Mehdi
Published: (2015)
by: Enshaei, Mehdi
Published: (2015)
How much money do spammers make from your website?
by: Hayati, P., et al.
Published: (2012)
by: Hayati, P., et al.
Published: (2012)
Topological comparison-based wormhole detection for MANET
by: Chan, King-Sun, et al.
Published: (2014)
by: Chan, King-Sun, et al.
Published: (2014)
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018)
by: Khan, Samia
Published: (2018)
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
by: Abd, Wamidh Jwdat
Published: (2019)
by: Abd, Wamidh Jwdat
Published: (2019)
Incidence and impact of dog attacks on guide dogs in the UK: an update
by: Moxon, Rachel, et al.
Published: (2016)
by: Moxon, Rachel, et al.
Published: (2016)
Synchrony in networks of coupled non-smooth dynamical systems: extending the master stability function
by: Coombes, Stephen, et al.
Published: (2016)
by: Coombes, Stephen, et al.
Published: (2016)
A probabilistic model for the evaluation of module extraction algorithms in complex biological networks
by: Gilbert, J.P.
Published: (2015)
by: Gilbert, J.P.
Published: (2015)
An analysis of TCP Port 0 traffic and net BIOS SMB spam advertisement incidents within a set of honeypots / Emran Mohd Tamil and Abdul Hamid Othman
by: Mohd Tamil, Emran, et al.
Published: (2006)
by: Mohd Tamil, Emran, et al.
Published: (2006)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
From clusters to queries: exploiting uncertainty in the modularity landscape of complex networks
by: Gilbert, James P., et al.
Published: (2018)
by: Gilbert, James P., et al.
Published: (2018)
Characterisation of web spambots using self organising maps
by: Hayati, Pedram, et al.
Published: (2011)
by: Hayati, Pedram, et al.
Published: (2011)
Behaviour-Based Web Spambot Detection by Utilising Action Time and Action Frequency
by: Hayati, Pedram, et al.
Published: (2010)
by: Hayati, Pedram, et al.
Published: (2010)
Similar Items
-
Evaluation of spam detection and prevention frameworks for email and image spam - a state of art
by: Hayati, Pedram, et al.
Published: (2008) -
Toward spam 2.0: an evaluation of web 2.0 anti-spam methods
by: Hayati, Pedram, et al.
Published: (2009) -
Deep neural networks for spam classification
by: Kasmani, Mohamed Khizer
Published: (2013) -
Factors Involved in Estimating Cost of Email Spam
by: Ridzuan, Farida, et al.
Published: (2010) -
Key Parameters in Identifying Cost of Spam 2.0
by: Ridzuan, Farida, et al.
Published: (2010)