T Pollock, Y Levy, W Li, A Kumar - Online Journal of Applied Knowledge …, 2022 - iiakm.org
Distracted users appear to have difficulties correctly distinguishing between legitimate and malicious emails or search engine results. Additionally, mobile phone users appear to have …
With the search engines' increasing importance in people's life, there are more and more attempts to illegitimately influence page ranking by means of web spam. Web spam …
In recent years, most content-based spam filters have been implemented using Machine Learning (ML) approaches by means of token-based representations of textual contents …
LA Abuwardih - International Journal of Advanced …, 2018 - pdfs.semanticscholar.org
Web spam is a deceiving technique that aims to get high ranks for the retrieved web pages at the top Search Engine Result Pages (SERPs). This paper provides an evaluation for the …
G Obaido - arXiv preprint arXiv:2203.03469, 2022 - arxiv.org
Structured Query Language (SQL) remains the standard language used in Relational Database Management Systems (RDBMSs) and has found applications in healthcare …
Post-authorship attribution is the computational process of determining the legitimate author of an online text snippet, such as an email, blog, forum post, or chat log, by employing …
M Callón, J Fdez-Glez, D Ruano-Ordás, R Laza… - Sensors, 2017 - mdpi.com
In this work we present the design and implementation of WARCProcessor, a novel multiplatform integrative tool aimed to build scientific datasets to facilitate experimentation in …
This thesis investigates concepts of value and the ways in which it is assessed in the digital humanities. It does this by examining digital cultural heritage projects created by a …
CJ Hoofnagle, I Altaweel, J Cabrera… - … of Technology, Crime …, 2017 - taylorfrancis.com
This chapter discusses online pharmacies, businesses that rely on computers and the scale provided by networks in order to sell and deliver pharmaceuticals. Online pharmacies are …