Social spam

Results: 618



#Item
1Detecting Spam URLs in Social Media via Behavioral Analysis Cheng Cao and James Caverlee Department of Computer Science and Engineering, Texas A&M University College Station, Texas, USA {chengcao,caverlee}@cse.tamu.edu

Detecting Spam URLs in Social Media via Behavioral Analysis Cheng Cao and James Caverlee Department of Computer Science and Engineering, Texas A&M University College Station, Texas, USA {chengcao,caverlee}@cse.tamu.edu

Add to Reading List

Source URL: faculty.cse.tamu.edu

- Date: 2015-04-18 18:07:04
    2The Role of the Underground Economy in Social Network Spam and Abuse Kurt Thomas  Electrical Engineering and Computer Sciences

    The Role of the Underground Economy in Social Network Spam and Abuse Kurt Thomas Electrical Engineering and Computer Sciences

    Add to Reading List

    Source URL: www2.eecs.berkeley.edu

    - Date: 2013-12-11 19:52:15
      3WWW.ONETEC.EU  AN EMAILING SYSTEM WITH VAST CAPABILITIES EASY

      WWW.ONETEC.EU AN EMAILING SYSTEM WITH VAST CAPABILITIES EASY

      Add to Reading List

      Source URL: www.onetec.eu

      Language: English - Date: 2014-12-02 02:59:20
      4Important Information About Internet Fraud “Phishing” is an online scam involving fraudulent email messages asking for confidential information such as passwords or account numbers. These emails, which are disguised

      Important Information About Internet Fraud “Phishing” is an online scam involving fraudulent email messages asking for confidential information such as passwords or account numbers. These emails, which are disguised

      Add to Reading List

      Source URL: texastuitionpromisefund.com

      Language: English - Date: 2015-09-01 00:02:56
      5Understanding and Combating Link Farming in the Twitter Social Network Saptarshi Ghosh Bimal Viswanath

      Understanding and Combating Link Farming in the Twitter Social Network Saptarshi Ghosh Bimal Viswanath

      Add to Reading List

      Source URL: www.mpi-sws.org

      Language: English - Date: 2012-02-27 08:41:25
      6Using Signal Detection Theory to Measure Phishing Detection Ability and Behavior Casey Canfield Baruch Fischhoff

      Using Signal Detection Theory to Measure Phishing Detection Ability and Behavior Casey Canfield Baruch Fischhoff

      Add to Reading List

      Source URL: cups.cs.cmu.edu

      Language: English - Date: 2015-07-03 02:38:28
      7Intelligent Spear Phishing Protection:  Stopping Highly Targeted Attacks Spear phishing is one of the top threats plaguing enterprises today, often resulting in severe financial losses and theft of intellectual property.

      Intelligent Spear Phishing Protection: Stopping Highly Targeted Attacks Spear phishing is one of the top threats plaguing enterprises today, often resulting in severe financial losses and theft of intellectual property.

      Add to Reading List

      Source URL: www.cloudmark.com

      Language: English - Date: 2016-01-11 19:00:03
      8School of Phish: A Real-World Evaluation of Anti-Phishing Training Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Cranor, Jason Hong, Mary Ann Blair, Theodore Pham Carnegie Mellon University

      School of Phish: A Real-World Evaluation of Anti-Phishing Training Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Cranor, Jason Hong, Mary Ann Blair, Theodore Pham Carnegie Mellon University

      Add to Reading List

      Source URL: cups.cs.cmu.edu

      Language: English - Date: 2009-09-22 14:35:41
      9THE FACTS: PHISHING AND SPEARPHISHING What is “phishing?” Email attack is the preferred method for many hackers. Verizon’s 2013 Data Breach Investigations Report found that “more than 95% of all attacks tied to s

      THE FACTS: PHISHING AND SPEARPHISHING What is “phishing?” Email attack is the preferred method for many hackers. Verizon’s 2013 Data Breach Investigations Report found that “more than 95% of all attacks tied to s

      Add to Reading List

      Source URL: www.arcyber.army.mil

      Language: English - Date: 2016-03-15 15:31:42
      10Cloudmark-logo-with-tagline_white

      Cloudmark-logo-with-tagline_white

      Add to Reading List

      Source URL: www.cloudmark.com

      Language: English - Date: 2016-05-06 12:39:06