71 |
Bayes kontra SpamSontag, Ralph 02 July 2003 (has links) (PDF)
Workshop Mensch-Computer-Vernetzung
Derzeitige Spam-Erkennung weist eklatante Mängel
auf. Die Zunahme des Spam-Aufkommens erfordet neue
Ansätze, um der Plage Herr zu werden.
Der Vortrag erläutert, wie mit Hilfe des Satzes
von Bayes die Spam-Erkennung deutlich verbessert
werden kann.
|
72 |
TRIPOLI - Empowered Email EnvironmentLohr, Frank 27 April 2004 (has links) (PDF)
Workshop "Netz- und Service-Infrastrukturen"
Der Vortrag im Rahmen des Workshop "Netz- und Service-Infrastrukturen" stellt
das Projekt Tripoli vor, zeigt Ziele und Prinzipien der erweiterten
Emailumgebung (Empowered Email Environment, Tripple-E) für authentifizierten
und zertifizierten Emailverkehr, Ablauf der Kommunikation und zu lösende
Probleme auf.
|
73 |
Analysis and detection of low quality information in social networksWang, De 21 September 2015 (has links)
Low quality information such as spam and rumors is a nuisance to people and hinders them from consuming information that is pertinent to them or that they are looking for. As social networks like Facebook, Twitter and Google+ have become important communication platforms in people's daily lives, malicious users make them as major targets to pollute with low quality information, which we also call as Denial of Information (DoI) attacks. How to analyze and detect low quality information in social networks for preventing DoI attacks is the major research problem I will address in this dissertation.
Although individual social networks are capable of filtering a significant amount of low quality information they receive, they usually require large amounts of resources (e.g, personnel) and incur a delay before detecting new types of low quality information. Also the evolution of various low quality information posts lots of challenges to defensive techniques. My work contains three major parts: 1). analytics and detection framework of low quality information, 2). evolutionary study of low quality information, and 3). detection approaches of low quality information. In part I, I proposed social spam analytics and detection framework SPADE across multiple social networks showing the efficiency and flexibility of cross-domain classification and associative classification. In part II, I performed a large-scale evolutionary study on web page spam and email spam over a long period of time. In part III, I designed three detection approaches used in detecting low quality information in social networks: click traffic analysis of short URL spam, behavior analysis of URL spam and information diffusion analysis of rumors in social networks. Our study shows promising results in analyzing and detecting low quality information in social networks.
|
74 |
Battling the Internet water army: detection of hidden paid posters.Chen, Cheng 04 July 2012 (has links)
Online social media, such as news websites and community question answering (CQA) portals, have made useful information accessible to more people. However, many of online comment areas and communities are flooded with fraudulent information. These messages come from a special group of online users, called online paid posters, or termed "Internet water army" in China, represents a new type of online job opportunities.
Online paid posters get paid for posting comments or articles on different online communities and websites for hidden purpose, e.g., to influence the opinion of other people towards certain social events or business markets. Though an interesting strategy in business marketing, paid posters may create a significant negative effect on the online communities, since the information from paid posters is usually not trustworthy.
We thoroughly investigate the behavioral pattern of online paid posters based on a real-world trace data from the social comments of a business conflict. We design and validate a new detection mechanism, including both non-semantic analysis and semantic analysis, to identify potential online paid posters. Using supervised and unsupervised approaches, our test results with real-world datasets show a very promising performance. / Graduate
|
75 |
Die Entwicklung der E-Mail-Werbung unter besonderer Berücksichtigung der UWG-Reform /Peters, Thomas. January 2006 (has links)
Zugl.: Hagen, FernUniversity, Diss., 2006.
|
76 |
Die Zulässigkeit unverlangter E-Mail-Werbung nach der UWG-Novelle : eine Darstellung der Ansprüche nach dem Wettbewerbsrecht, Zivilrecht einschließlich Unterlassungsklagengesetz, Datenschutzrecht und Markenrecht sowie der Folgen im Strafrecht /Altermann, Karen. January 2006 (has links)
Universiẗat, Diss., 2006--Münster (Westfalen).
|
77 |
E-Mail-Kategorisierung und Spam-Detektion mit SENTRAX [Mustererkennung mit Assoziativmatrizen]Frobese, Dirk T. January 2009 (has links)
Zugl.: Hildesheim, Univ., Diss., 2009
|
78 |
Graph-based email prioritizationNussbaum, Ronald. January 2008 (has links)
Thesis (M.S.)--Michigan State University. Computer Science and Engineering, 2008. / Title from PDF t.p. (viewed on July 29, 2009) Includes bibliographical references (p. 45-47). Also issued in print.
|
79 |
Spamerkennung mit Support Vector MachinesMöller, Manuel. January 2005 (has links)
Chemnitz, Techn. Univ., Studienarb., 2005.
|
80 |
Die Regulierung von Spam und unerbetenen kommerziellen E-Mails : eine Studie zur Rechtslage in Deutschland, dem Vereinigten Königreich und den U.S.A. unter Berücksichtigung empirischer Daten und der ökonomischen Analyse des Rechts /Mederle, Daniela. January 2010 (has links)
Zugl.: Augsburg, Universiẗat, Diss., 2009.
|
Page generated in 0.0284 seconds