Identification and Analysis of Spam Words from Facebook Spam Comments
نویسندگان
چکیده
منابع مشابه
Spam Blog Filtering with Bipartite Graph Clustering and Mutual Detection between Spam Blogs and Words
This paper proposes a mutual detection mechanism between spam blogs and words with bipartite graph clustering for fi ltering spam blogs from updated blog data. Spam blogs are problematic in extracting useful marketing information from the blogosphere; they often appear to be rich sources of information based on individual opinion and social reputation. One characteristic of spam blogs is copied...
متن کاملStock Spam Analysis
Stock spam is a part of unsolicited electronic mail which wants its receiver to buy a certain share at the stock markets. As there is no direct profit for the sender of this message, impacts on the share prices seem to be the only way to generate earnings by the spam sender. To hide the information within stock spam messages from automatic processing, textual and image-based distortions are use...
متن کاملSpam Filter Analysis
Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, have been proposed. In this paper we investigate the effectiveness of several spam filtering techniques and technologies. Our analysis was performed by simulating email traffic under different conditions. We show that ge...
متن کاملBreaking Anti-Spam Systems with Parasitic Spam
The existance of networks of ‘bots’ raises the possibility of a new type of spam that breaks the current paradigm of spam defense, in which the defence acts purely as a filter. This spam, which we call parasitic spam, looks to a filter very much like spam with scraped text, but contains instead legitimate content going from a legitimate sender to a legitimate recipient. In this problem statemen...
متن کاملFiltering spam from bad neighborhoods
One of the most annoying problems on the Internet is spam. To fight spam, many approaches have been proposed over the years. Most of these approaches involve scanning the entire contents of e-mail messages in an attempt to detect suspicious keywords and patterns. Although such approaches are relatively effective, they also show some disadvantages. Therefore an interesting question is whether it...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2016
ISSN: 0975-8887
DOI: 10.5120/ijca2016910587