Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 221,894,027 papers from all fields of science
Search
Sign In
Create Free Account
Spamming
Known as:
Ratware
, Electronic spamming
, Spam text
Expand
Electronic spamming is the use of electronic messaging systems to send an unsolicited message (spam), especially advertising, as well as sending…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ARMM (Usenet)
ASCII art
Blackhole exploit kit
Botnet
Expand
Broader (2)
Cybercrime
E-commerce
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Detecting Spam URLs in Social Media via Behavioral Analysis
C. Cao
,
James Caverlee
European Conference on Information Retrieval
2015
Corpus ID: 1631721
This paper addresses the challenge of detecting spam URLs in social media, which is an important task for shielding users from…
Expand
Highly Cited
2014
Highly Cited
2014
Crowd-powered find algorithms
A. Sarma
,
Aditya G. Parameswaran
,
H. Garcia-Molina
,
A. Halevy
IEEE International Conference on Data Engineering
2014
Corpus ID: 17275564
We consider the problem of using humans to find a bounded number of items satisfying certain properties, from a data set. For…
Expand
Highly Cited
2012
Highly Cited
2012
A social recommender mechanism for improving knowledge sharing in online forums
Yung-Ming Li
,
Tzu-Fong Liao
,
Cheng-Yang Lai
Information Processing & Management
2012
Corpus ID: 44659053
Highly Cited
2010
Highly Cited
2010
A study of spam filtering using support vector machines
Ola Amayri
,
N. Bouguila
Artificial Intelligence Review
2010
Corpus ID: 22022953
Electronic mail is a major revolution taking place over traditional communication systems due to its convenient, economical, fast…
Expand
Highly Cited
2009
Highly Cited
2009
What DNS is not
P. Vixie
Communications of the ACM
2009
Corpus ID: 6030367
DNS is many things to many people---perhaps too many things to too many people.
Highly Cited
2008
Highly Cited
2008
An information granulation based data mining approach for classifying imbalanced data
Mu-Chen Chen
,
Long-Sheng Chen
,
Chun-Chin Hsu
,
Wei-Rong Zeng
Information Sciences
2008
Corpus ID: 7121000
Highly Cited
2008
Highly Cited
2008
DistanceRank: An intelligent ranking algorithm for web pages
Ali Mohammad Zareh Bidoki
,
N. Yazdani
Information Processing & Management
2008
Corpus ID: 9725263
2008
2008
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?
Carlton R. Davis
,
S. Neville
,
José M. Fernandez
,
J. Robert
,
J. McHugh
European Symposium on Research in Computer…
2008
Corpus ID: 2942566
Botnets, in particular the Storm botnet, have been garnering much attention as vehicles for Internet crime. Storm uses a modified…
Expand
Highly Cited
2005
Highly Cited
2005
An Analysis of Factors Used in Search Engine Ranking
A. Bifet
,
Carlos Castillo
,
P. Chirita
,
Ingmar Weber
Adversarial Information Retrieval on the Web
2005
Corpus ID: 1419813
This paper investigates the influence of different page features on the ranking of search engine results. We use Google (via its…
Expand
Highly Cited
2004
Highly Cited
2004
SpamBayes: Effective open-source, Bayesian based, email classification system
T. Meyer
,
Brendon Whateley
International Conference on Email and Anti-Spam
2004
Corpus ID: 2368172
This paper introduces the SpamBayes classification engine and outlines the most important features and techniques which…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE