First Page | Document Content | |
---|---|---|
Date: 2012-06-08 17:16:25Computer crimes Crimes Social engineering Spam Identity theft Phishing Credit card fraud Email spam Organized crime Cybercrime Spamming Internet | Measuring the Cost of Cybercrime Ross Anderson 1 Chris Barton 2 Rainer B¨ohme 3 Richard Clayton 4 Michel J.G. van Eeten 5Add to Reading ListSource URL: cseweb.ucsd.eduDownload Document from Source WebsiteFile Size: 403,53 KBShare Document on Facebook |
Click Trajectories: End-to-End Analysis of the Spam Value ChainDocID: 1xVUj - View Document | |
Effect of Spam on Hashtag Recommendation for Tweets Surendra Sedhai Aixin Sun Nanyang Technological University, Nanyang Avenue, SingaporeDocID: 1xVU9 - View Document | |
Can One Tamper with the Sample API? - Toward Neutralizing Bias from Spam and Bot Content Fred Morstatter, Harsh Dani, Justin Sampson, and Huan Liu Arizona State University, Tempe, AZ, USA {fred.morstatter, harsh.dani, jDocID: 1xUgz - View Document | |
PDF DocumentDocID: 1xyjp - View Document | |
DOC DocumentDocID: 1xsO0 - View Document |