Preventing Spam Blogs Using Content Analysis and User Behaviour Model
Spam blog is a subset of blog which contains nothing more than stolen materials and inauthentic text designed to gain profit from various type of advertisements. Splogs have become a nuisance in the blogosphere because it pollutes search engine results and blog update servers. This paper discusses t...
| Auteur principal: | Mohammad Hafiz, Ismail |
|---|---|
| Format: | Thèse |
| Langue: | anglais anglais |
| Publié: |
2007
|
| Sujets: | |
| Accès en ligne: | https://etd.uum.edu.my/21/1/mohammad_hafiz.pdf https://etd.uum.edu.my/21/2/mohammad_hafiz.pdf |
Documents similaires
Singleton spam review detection using classification techniques
par: Heydari, Atefeh
Publié: (2014)
par: Heydari, Atefeh
Publié: (2014)
Improving spam detection using fingerprinting at packet level
par: Mahid, Zaitul Iradah
Publié: (2010)
par: Mahid, Zaitul Iradah
Publié: (2010)
A hardware architecture of stateless open digest spam fingerprinting unit
par: Monemi, Alireza
Publié: (2010)
par: Monemi, Alireza
Publié: (2010)
Designing user roles and content sharing workflow for web content management system in higher education
par: Mohammed Amin, Brzu Tahir
Publié: (2013)
par: Mohammed Amin, Brzu Tahir
Publié: (2013)
Development of an automatic attitude recognition system: a multimodal analysis of video blogs
par: Noor Alhusna Madzlan
Publié: (2017)
par: Noor Alhusna Madzlan
Publié: (2017)
Effective blackout prevention system
par: Hamzah, Nazaitul Idya
Publié: (2010)
par: Hamzah, Nazaitul Idya
Publié: (2010)
Analysis of user awareness on phishing attempt among student
par: Nagalingam, Vanisri
Publié: (2014)
par: Nagalingam, Vanisri
Publié: (2014)
A neighbor's trust based model for prevention of black hole attack in wireless modile ad hoc networks
par: Araghi, Tanya Koohpayeh
Publié: (2013)
par: Araghi, Tanya Koohpayeh
Publié: (2013)
Simulation of the ankle foot orthoses with prevention design for pronation and supination
par: Mohd. Salleh, ‘Ali Syari’Ati
Publié: (2015)
par: Mohd. Salleh, ‘Ali Syari’Ati
Publié: (2015)
Building user node driver and server node driver for RS-232C communication
par: Ismail, Nordinah
Publié: (1992)
par: Ismail, Nordinah
Publié: (1992)
Adaptive distance protection to prevent mal operation with STATCOM on a transmission line
par: Ting, Joseph Lian Hock
Publié: (2019)
par: Ting, Joseph Lian Hock
Publié: (2019)
Enhancement of stemming process for malay illicit web content
par: Noor Fatihah , Mazlam
Publié: (2012)
par: Noor Fatihah , Mazlam
Publié: (2012)
Content management framework of Malaysian government web sites
par: Ab. Rahman, Hashim
Publié: (2004)
par: Ab. Rahman, Hashim
Publié: (2004)
Amylose content calibration model for the three types of selected rice grains using visible shortwave near infrared spectroscopy
par: Ibrahim, Syahira
Publié: (2015)
par: Ibrahim, Syahira
Publié: (2015)
Effective preventive maintenance planning procedures for continuously operating power generation equipment and systems
par: Ali Hassan, Ibrahim Moallim
Publié: (1995)
par: Ali Hassan, Ibrahim Moallim
Publié: (1995)
Interactive graphical user interface for incentive spirometer
par: Sirkunan, Jeevan
Publié: (2022)
par: Sirkunan, Jeevan
Publié: (2022)
Investigating Droidkungfu Android Malware Behaviour Through Static Analysis
par: Najiahtul Syafiqah, Ismail
Publié: (2013)
par: Najiahtul Syafiqah, Ismail
Publié: (2013)
Redundant-free web services composition with user requirements consideration
par: Safi, Amirhossein
Publié: (2013)
par: Safi, Amirhossein
Publié: (2013)
An investigation into the usability of the Malaysian Universities web pages user interface
par: Abdalla, Saad Osman
Publié: (1998)
par: Abdalla, Saad Osman
Publié: (1998)
Electricity consumption pattern disaggregation based on user utilization factor
par: Asa @ Esa, Nur Farahin
Publié: (2016)
par: Asa @ Esa, Nur Farahin
Publié: (2016)
Prevention And Detection Mechanism For Security In Passive Rfid System
par: Khor, Jing Huey
Publié: (2013)
par: Khor, Jing Huey
Publié: (2013)
Implementation of a hybrid burst contention resolution algorithm for optical burst switching networks
par: Elhaddad, Bashir Emhemed
Publié: (2012)
par: Elhaddad, Bashir Emhemed
Publié: (2012)
Analysis and modelling of ultracapacitor
par: Rai, Nor Akmal
Publié: (2015)
par: Rai, Nor Akmal
Publié: (2015)
Modeling and analysis pv module in various temperature and irradiance inputs using matlab/simulink algorithm
par: Ismail, Norhaisam
Publié: (2021)
par: Ismail, Norhaisam
Publié: (2021)
The use of PSPICE analogue behavioural modelling for the simulation of a PWM static VCR compensator
par: Solaiman Miah, Md. Abu
Publié: (1993)
par: Solaiman Miah, Md. Abu
Publié: (1993)
The effect of platform instability on the user terminal and backhaul link performance of HAPS UMTS
par: Raihan, Zahir
Publié: (2007)
par: Raihan, Zahir
Publié: (2007)
A survey on factors affecting fuel smart card user acceptance and security
par: Eslami, Seyed Gholamereza
Publié: (2010)
par: Eslami, Seyed Gholamereza
Publié: (2010)
Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier
par: Syurahbil, A
Publié: (2011)
par: Syurahbil, A
Publié: (2011)
Investigating Goldream Behaviour Through Dynamic Analysis
par: Halizah, Saad
Publié: (2013)
par: Halizah, Saad
Publié: (2013)
Bidirection modeling and experimental analysis of underwater snake robot
par: Na, Zhang
Publié: (2021)
par: Na, Zhang
Publié: (2021)
Load modelling and simulation of industrial and residential load for harmonic analysis
par: Mohamad, Mohamad Naim
Publié: (2016)
par: Mohamad, Mohamad Naim
Publié: (2016)
Multiple Road Users Detection And Tracking System In Urban Mixed Traffic Scenes
par: Chan, Zhen Yu
Publié: (2020)
par: Chan, Zhen Yu
Publié: (2020)
Measurement and dimensional analysis modelling of electroluminescence in low density polyethylene material
par: Bani, Nurul Aini
Publié: (2016)
par: Bani, Nurul Aini
Publié: (2016)
Modeling and analysis of cylindrical gate-all around silicon nanowire FET including BOHM quantum potential model
par: Abd. Razak, Muhammad A’tif
Publié: (2018)
par: Abd. Razak, Muhammad A’tif
Publié: (2018)
Histogram Equalization Based Methods
For Brightness Preservation And Local
Content Emphasis
par: Nicholas , Sia Pik Kong
Publié: (2009)
par: Nicholas , Sia Pik Kong
Publié: (2009)
The Awareness Of Information Security Breach Among User IT In KPTMBP
par: Othman, Intan Safina
Publié: (2016)
par: Othman, Intan Safina
Publié: (2016)
The Modelling Of Tyre Rotation Behaviour With Tyre Pressure Monitoring System
par: Goh, Yik Choong
Publié: (2017)
par: Goh, Yik Choong
Publié: (2017)
An embedded fuzzy behaviour based controller for mobile robot
par: A. Majid, Norhayati
Publié: (2007)
par: A. Majid, Norhayati
Publié: (2007)
Colour-Texture Fusion In Image Segmentation For
Content-Based Image Retrieval Systems
par: Ooi , Woi Seng
Publié: (2007)
par: Ooi , Woi Seng
Publié: (2007)
Parallel unbalanced three-phase power flow analysis including distributed generation models
par: Syafii, Syafii
Publié: (2011)
par: Syafii, Syafii
Publié: (2011)
Documents similaires
-
Singleton spam review detection using classification techniques
par: Heydari, Atefeh
Publié: (2014) -
Improving spam detection using fingerprinting at packet level
par: Mahid, Zaitul Iradah
Publié: (2010) -
A hardware architecture of stateless open digest spam fingerprinting unit
par: Monemi, Alireza
Publié: (2010) -
Designing user roles and content sharing workflow for web content management system in higher education
par: Mohammed Amin, Brzu Tahir
Publié: (2013) -
Development of an automatic attitude recognition system: a multimodal analysis of video blogs
par: Noor Alhusna Madzlan
Publié: (2017)