Results 11 to 20 of about 267 (75)

Poster: How to best inform website owners about vulnerabilities on their websites [PDF]

open access: yes, 2023
Background. Content management systems (CMS) provide default features that make it easy even for laypersons to create and maintain sophisticated websites [3]. But a CMS also poses a security risk.
Hennig, Anne   +4 more
core   +2 more sources

BlogForever: D2.5 Weblog Spam Filtering Report and Associated Methodology [PDF]

open access: yes, 2013
This report is written as a first attempt to define the BlogForever spam detection strategy. It comprises a survey of weblog spam technology and approaches to their detection.
Banos, Vangelis   +6 more
core   +2 more sources

Nepotistic relationships in Twitter and their impact on rank prestige algorithms [PDF]

open access: yes, 2012
Micro-blogging services such as Twitter allow anyone to publish anything, anytime. Needless to say, many of the available contents can be diminished as babble or spam.
Gayo Avello, Daniel
core   +2 more sources

Standing out among the daily spam: How to catch website owners\u27 attention by means of vulnerability notifications [PDF]

open access: yes, 2022
Running a business without having a website is nearly impossible nowadays. Most business owners use content managements sys- tems to manage their websites. Yet, those can pose security risks and provide vulnerabilities for manipulations.
Hennig, Anne   +4 more
core   +2 more sources

Cryptocurrency scams: analysis and perspectives [PDF]

open access: yes, 2021
Since the inception of Bitcoin in 2009, the market of cryptocurrencies has grown beyond the initial expectations, as witnessed by the thousands of tokenised assets available on the market, whose daily trades amount to dozens of USD billions.
Bartoletti M.   +4 more
core   +1 more source

A Taxonomy of Hyperlink Hiding Techniques

open access: yes, 2014
Hidden links are designed solely for search engines rather than visitors. To get high search engine rankings, link hiding techniques are usually used for the profitability of black industries, such as illicit game servers, false medical services, illegal
Geng, Guang-Gang   +3 more
core   +1 more source

A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks [PDF]

open access: yes, 2015
Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that employ a variety of attack vectors and strategies to psychologically manipulate a user.
Heartfield, Ryan, Loukas, George
core   +2 more sources

When brand distinctiveness is in the AI of the beholder:Trademark law for autonomous intelligent shopping agents [PDF]

open access: yes, 2022
Trademark law is quintessentially a response to all too human cognitive failures: We have limited time, limited attention spans, limited memory and an ability for pattern recognition that on the one hand is highly evolved, but also prone to manipulation.
de Amstalden, Mariela, Schafer, Burkhard
core   +2 more sources

Web Spam DetectionUsing Fuzzy Clustering [PDF]

open access: yes, 2013
Internet is the most widespread medium to express our views and ideas and a lucrative platform for delivering the products. F or this in tention, search engine plays a key role.
, J.Shyam Jegadeesh, P.Libin Jacob, J.John Spencer, C.Stanly DevaKumar
core   +2 more sources

Incentive-Centered Design for User-Contributed Content [PDF]

open access: yes, 2012
We review incentive-centered design for user-contributed content (UCC) on the Internet. UCC systems, produced (in part) through voluntary contributions made by non-employees, face fundamental incentives problems.
Jian, Lian, MacKie-Mason, Jeffrey K.
core   +1 more source

Home - About - Disclaimer - Privacy