Results 11 to 20 of about 262 (84)
Keywords, discoverability, and impact. [PDF]
Editors' Note: Keywords will improve the article impact and are now necessary for Journal of the Medical Library Association articles. Here is a brief editorial with background information.
Tanja Bekhuis
semanticscholar +2 more sources
Cryptocurrency scams: analysis and perspectives [PDF]
Since the inception of Bitcoin in 2009, the market of cryptocurrencies has grown beyond the initial expectations, as witnessed by the thousands of tokenised assets available on the market, whose daily trades amount to dozens of USD billions.
Bartoletti M.+4 more
core +1 more source
In Code, We Trust?:Regulation and Emancipation in Cyberspace [PDF]
Code is one of the regulatory modalities as identified by Lawrence Lessig. It is proposed that, in cyberspace, code should not only regulate but also emancipate. However, the emancipatory dimension of code has long been neglected since law and market are
Zhu, Chen Wei
core +2 more sources
개인 사회망 네트워크 분석 기반 온라인 사회 공격자 탐지 [PDF]
학위논문(박사)--서울대학교 대학원 :공과대학 컴퓨터공학부,2020. 2. 김종권.In the last decade we have witnessed the explosive growth of online social networking services (SNSs) such as Facebook, Twitter, Weibo and LinkedIn.
정시현
core
A Taxonomy of Hyperlink Hiding Techniques
Hidden links are designed solely for search engines rather than visitors. To get high search engine rankings, link hiding techniques are usually used for the profitability of black industries, such as illicit game servers, false medical services, illegal
Geng, Guang-Gang+3 more
core +1 more source
Discernment of Search Engine Spamming and Counter Measure for It
In today’s world everyone is glancing for online information through search engine. As there are lots of providers for information searched by the user, and it is not possible to display all the information on the first page of search engine.
Sukrati Agrawal+2 more
semanticscholar +1 more source
Nepotistic relationships in Twitter and their impact on rank prestige algorithms [PDF]
Micro-blogging services such as Twitter allow anyone to publish anything, anytime. Needless to say, many of the available contents can be diminished as babble or spam.
Gayo Avello, Daniel
core +2 more sources
FEATURE SELECTION -MODEL -BASED CONTENT ANALYSIS FOR COMBATING WEB SPAM
With the increasing growth of Internet and World Wide Web, information retrieval (IR) has attracted much attention in recent years. Quick, accurate and quality information mining is the core concern of successful search companies.
Shipra Mittal, A. Juneja
semanticscholar +1 more source
Telegram Channels and Bots: A Ranking of Media Outlets Based in Spain [PDF]
Telegram, an Industry 4.0 style communication service, is one of the world’s most widespread communication platforms. The availability of channels and bots has opened as a broadcast channel for any media outlet.
Castro Castro, Carlos+1 more
core +1 more source
Transforming Message Detection [PDF]
The majority of existing spam filtering techniques suffers from several serious disadvantages. Some of them provide many false positives. The others are suitable only for email filtering and may not be used in IM and social networks.
Ermakova, L.
core