The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Steve Webb: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kang Li, Shanshan Ding, Doug McCreary, Steve Webb
    Analysis of state exposure control to prevent cheating in online games. [Citation Graph (0, 0)][DBLP]
    NOSSDAV, 2004, pp:140-145 [Conf]
  2. Steve Webb, Subramanyam Chitti, Calton Pu
    An experimental evaluation of spam filter performance and robustness against attack. [Citation Graph (0, 0)][DBLP]
    CollaborateCom, 2005, pp:- [Conf]
  3. Steve Webb
    Crimes And Misdemeanours: How to Protect Corporate Information in the Internet Age. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:128-132 [Journal]
  4. James Caverlee, Steve Webb, Ling Liu
    Spam-Resilient Web Rankings via Influence Throttling. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2007, pp:1-10 [Conf]

  5. Characterizing Web Spam Using Content and HTTP Session Analysis. [Citation Graph (, )][DBLP]


  6. Introducing the Webb Spam Corpus: Using Email Spam to Identify Web Spam Automatically. [Citation Graph (, )][DBLP]


  7. Social Honeypots: Making Friends With A Spammer Near You. [Citation Graph (, )][DBLP]


  8. Observed Trends in Spam Construction Techniques: A Case Study of Spam Evolution. [Citation Graph (, )][DBLP]


  9. A Discriminative Classifier Learning Approach to Image Modeling and Spam Image Identification. [Citation Graph (, )][DBLP]


  10. Predicting web spam with HTTP session information. [Citation Graph (, )][DBLP]


  11. Using Bayesian Logistic Regression with High-Order Interactions to Model Radiation-Induced Toxicities Following Radiotherapy. [Citation Graph (, )][DBLP]


  12. Socialtrust: tamper-resilient trust establishment in online communities. [Citation Graph (, )][DBLP]


  13. Uncovering social spammers: social honeypots + machine learning. [Citation Graph (, )][DBLP]


  14. Towards robust trust establishment in web-based social networks with socialtrust. [Citation Graph (, )][DBLP]


  15. The social honeypot project: protecting online communities from spammers. [Citation Graph (, )][DBLP]


  16. A Summary of Granular Computing System Vulnerabilities: Exploring the Dark Side of Social Networking Communities. [Citation Graph (, )][DBLP]


  17. Large Online Social Footprints-An Emerging Threat. [Citation Graph (, )][DBLP]


  18. Study of Static Classification of Social Spam Profiles in MySpace. [Citation Graph (, )][DBLP]


  19. A Large-Scale Study of MySpace: Observations and Implications for Online Social Networks. [Citation Graph (, )][DBLP]


Search in 0.049secs, Finished in 0.050secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002