Results 11 to 20 of about 262 (84)

Keywords, discoverability, and impact. [PDF]

open access: yesJ Med Libr Assoc, 2015
Editors' Note: Keywords will improve the article impact and are now necessary for Journal of the Medical Library Association articles. Here is a brief editorial with background information.
Tanja Bekhuis
semanticscholar   +2 more sources

Cryptocurrency scams: analysis and perspectives [PDF]

open access: yes, 2021
Since the inception of Bitcoin in 2009, the market of cryptocurrencies has grown beyond the initial expectations, as witnessed by the thousands of tokenised assets available on the market, whose daily trades amount to dozens of USD billions.
Bartoletti M.   +4 more
core   +1 more source

In Code, We Trust?:Regulation and Emancipation in Cyberspace [PDF]

open access: yes, 2004
Code is one of the regulatory modalities as identified by Lawrence Lessig. It is proposed that, in cyberspace, code should not only regulate but also emancipate. However, the emancipatory dimension of code has long been neglected since law and market are
Zhu, Chen Wei
core   +2 more sources

개인 사회망 네트워크 분석 기반 온라인 사회 공격자 탐지 [PDF]

open access: yes, 2020
학위논문(박사)--서울대학교 대학원 :공과대학 컴퓨터공학부,2020. 2. 김종권.In the last decade we have witnessed the explosive growth of online social networking services (SNSs) such as Facebook, Twitter, Weibo and LinkedIn.
정시현
core  

A Taxonomy of Hyperlink Hiding Techniques

open access: yes, 2014
Hidden links are designed solely for search engines rather than visitors. To get high search engine rankings, link hiding techniques are usually used for the profitability of black industries, such as illicit game servers, false medical services, illegal
Geng, Guang-Gang   +3 more
core   +1 more source

Discernment of Search Engine Spamming and Counter Measure for It

open access: yes, 2016
In today’s world everyone is glancing for online information through search engine. As there are lots of providers for information searched by the user, and it is not possible to display all the information on the first page of search engine.
Sukrati Agrawal   +2 more
semanticscholar   +1 more source

Nepotistic relationships in Twitter and their impact on rank prestige algorithms [PDF]

open access: yes, 2012
Micro-blogging services such as Twitter allow anyone to publish anything, anytime. Needless to say, many of the available contents can be diminished as babble or spam.
Gayo Avello, Daniel
core   +2 more sources

FEATURE SELECTION -MODEL -BASED CONTENT ANALYSIS FOR COMBATING WEB SPAM

open access: yes, 2016
With the increasing growth of Internet and World Wide Web, information retrieval (IR) has attracted much attention in recent years. Quick, accurate and quality information mining is the core concern of successful search companies.
Shipra Mittal, A. Juneja
semanticscholar   +1 more source

Telegram Channels and Bots: A Ranking of Media Outlets Based in Spain [PDF]

open access: yes, 2022
Telegram, an Industry 4.0 style communication service, is one of the world’s most widespread communication platforms. The availability of channels and bots has opened as a broadcast channel for any media outlet.
Castro Castro, Carlos   +1 more
core   +1 more source

Transforming Message Detection [PDF]

open access: yes, 2011
The majority of existing spam filtering techniques suffers from several serious disadvantages. Some of them provide many false positives. The others are suitable only for email filtering and may not be used in IM and social networks.
Ermakova, L.
core  

Home - About - Disclaimer - Privacy