2007
DOI: 10.1109/mic.2007.125
|View full text |Cite
|
Sign up to set email alerts
|

Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
134
0
3

Year Published

2009
2009
2017
2017

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 221 publications
(137 citation statements)
references
References 4 publications
0
134
0
3
Order By: Relevance
“…Moreover, users should not reveal private information carelessly and OSN service providers should ascertain that user information is not revealed by de-anonymization attacks. The three methods suggested for dealing with spams by (Heymann et al, 2007) can be generalized for developing defense methods for social attacks: prevention, detection, and demotion. Prevention methods should guarantee that the identities belong to real people, relationships among identities are real, and messages that are posted are verified if needed.…”
Section: Forensics Analysis and Defense Methods For Social Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, users should not reveal private information carelessly and OSN service providers should ascertain that user information is not revealed by de-anonymization attacks. The three methods suggested for dealing with spams by (Heymann et al, 2007) can be generalized for developing defense methods for social attacks: prevention, detection, and demotion. Prevention methods should guarantee that the identities belong to real people, relationships among identities are real, and messages that are posted are verified if needed.…”
Section: Forensics Analysis and Defense Methods For Social Attacksmentioning
confidence: 99%
“…The countermeasures for spams are grouped as detection, demotion, and prevention by (Heymann et al, 2007). These countermeasures could be generalized to all types of messages.…”
Section: Prevention Detection and Demotionmentioning
confidence: 99%
“…Similarly, Benevenuto et al (2008) explored the attributes on video spam by applying them onto classification algorithms for video spam detection. Heymann et al (2007) summarised existing anti-spam strategies into three categories: detection-based, demotion-based, and prevention-based.…”
Section: Malicious Actor Detecting Mechanisms For Communitiesmentioning
confidence: 99%
“…Heymann et al [6] classified antispam strategies into three categories: prevention, detection, and demotion. Prevention-based approaches aim at making it difficult for spam content to contribute to social tagging systems by restricting certain access types through interfaces [such as CAPTCHA [7] (which stands for "completely automated public Turing test to tell computers and humans apart") or reCAPTCHA [8]] or through usage limits (such as tagging quota, e.g., Flickr introduced a limit of 75 tags per photo [9]).…”
Section: Background and Significancementioning
confidence: 99%