A novel ensemble decision tree based on under-sampling and clonal selection for web spam detection

XY Lu, MS Chen, JL Wu, PC Chang… - Pattern Analysis and …, 2018 - Springer
Currently, web spamming is a serious problem for search engines. It not only degrades the
quality of search results by intentionally boosting undesirable web pages to users, but also …

Pilot testing of experimental procedures to measure user's judgment errors in simulated social engineering attacks

T Pollock, Y Levy, W Li, A Kumar - Online Journal of Applied Knowledge …, 2022 - iiakm.org
Distracted users appear to have difficulties correctly distinguishing between legitimate and
malicious emails or search engine results. Additionally, mobile phone users appear to have …

[PDF][PDF] Google search algorithm updates against web spam

A Chandra, M Suaib, R Beg - Department of Computer Science & …, 2015 - academia.edu
With the search engines' increasing importance in people's life, there are more and more
attempts to illegitimately influence page ranking by means of web spam. Web spam …

SDRS: a new lossless dimensionality reduction for text corpora

IV de Mendizabal, V Basto-Fernandes… - Information Processing …, 2020 - Elsevier
In recent years, most content-based spam filters have been implemented using Machine
Learning (ML) approaches by means of token-based representations of textual contents …

[PDF][PDF] Towards evaluating web spam threats and countermeasures

LA Abuwardih - International Journal of Advanced …, 2018 - pdfs.semanticscholar.org
Web spam is a deceiving technique that aims to get high ranks for the retrieved web pages
at the top Search Engine Result Pages (SERPs). This paper provides an evaluation for the …

PhD thesis: SQL Comprehension and Synthesis

G Obaido - arXiv preprint arXiv:2203.03469, 2022 - arxiv.org
Structured Query Language (SQL) remains the standard language used in Relational
Database Management Systems (RDBMSs) and has found applications in healthcare …

[PDF][PDF] Regularized Deep Neural Network for Post-Authorship Attribution

A Modupe - 2024 - wiredspace.wits.ac.za
Post-authorship attribution is the computational process of determining the legitimate author
of an online text snippet, such as an email, blog, forum post, or chat log, by employing …

Warcprocessor: An integrative tool for building and management of web spam corpora

M Callón, J Fdez-Glez, D Ruano-Ordás, R Laza… - Sensors, 2017 - mdpi.com
In this work we present the design and implementation of WARCProcessor, a novel
multiplatform integrative tool aimed to build scientific datasets to facilitate experimentation in …

Understanding value in digital humanities: a case study from a community oral history archive

P Johnston - 2018 - cora.ucc.ie
This thesis investigates concepts of value and the ways in which it is assessed in the digital
humanities. It does this by examining digital cultural heritage projects created by a …

Online pharmacies and technology crime

CJ Hoofnagle, I Altaweel, J Cabrera… - … of Technology, Crime …, 2017 - taylorfrancis.com
This chapter discusses online pharmacies, businesses that rely on computers and the scale
provided by networks in order to sell and deliver pharmaceuticals. Online pharmacies are …