Poster: How to best inform website owners about vulnerabilities on their websites [PDF]
Background. Content management systems (CMS) provide default features that make it easy even for laypersons to create and maintain sophisticated websites [3]. But a CMS also poses a security risk.
Hennig, Anne +4 more
core +2 more sources
BlogForever: D2.5 Weblog Spam Filtering Report and Associated Methodology [PDF]
This report is written as a first attempt to define the BlogForever spam detection strategy. It comprises a survey of weblog spam technology and approaches to their detection.
Banos, Vangelis +6 more
core +2 more sources
Nepotistic relationships in Twitter and their impact on rank prestige algorithms [PDF]
Micro-blogging services such as Twitter allow anyone to publish anything, anytime. Needless to say, many of the available contents can be diminished as babble or spam.
Gayo Avello, Daniel
core +2 more sources
Standing out among the daily spam: How to catch website owners\u27 attention by means of vulnerability notifications [PDF]
Running a business without having a website is nearly impossible nowadays. Most business owners use content managements sys- tems to manage their websites. Yet, those can pose security risks and provide vulnerabilities for manipulations.
Hennig, Anne +4 more
core +2 more sources
Cryptocurrency scams: analysis and perspectives [PDF]
Since the inception of Bitcoin in 2009, the market of cryptocurrencies has grown beyond the initial expectations, as witnessed by the thousands of tokenised assets available on the market, whose daily trades amount to dozens of USD billions.
Bartoletti M. +4 more
core +1 more source
A Taxonomy of Hyperlink Hiding Techniques
Hidden links are designed solely for search engines rather than visitors. To get high search engine rankings, link hiding techniques are usually used for the profitability of black industries, such as illicit game servers, false medical services, illegal
Geng, Guang-Gang +3 more
core +1 more source
A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks [PDF]
Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that employ a variety of attack vectors and strategies to psychologically manipulate a user.
Heartfield, Ryan, Loukas, George
core +2 more sources
When brand distinctiveness is in the AI of the beholder:Trademark law for autonomous intelligent shopping agents [PDF]
Trademark law is quintessentially a response to all too human cognitive failures: We have limited time, limited attention spans, limited memory and an ability for pattern recognition that on the one hand is highly evolved, but also prone to manipulation.
de Amstalden, Mariela, Schafer, Burkhard
core +2 more sources
Web Spam DetectionUsing Fuzzy Clustering [PDF]
Internet is the most widespread medium to express our views and ideas and a lucrative platform for delivering the products. F or this in tention, search engine plays a key role.
, J.Shyam Jegadeesh, P.Libin Jacob, J.John Spencer, C.Stanly DevaKumar
core +2 more sources
Incentive-Centered Design for User-Contributed Content [PDF]
We review incentive-centered design for user-contributed content (UCC) on the Internet. UCC systems, produced (in part) through voluntary contributions made by non-employees, face fundamental incentives problems.
Jian, Lian, MacKie-Mason, Jeffrey K.
core +1 more source

