<--- Back to Details
First PageDocument Content
Computer network security / Multi-agent systems / Electronic commerce / Botnets / Internet bot / Rustock botnet / Denial-of-service attack / Web search query / Click fraud / Computing / Spamming / Internet
Date: 2009-12-30 02:07:56
Computer network security
Multi-agent systems
Electronic commerce
Botnets
Internet bot
Rustock botnet
Denial-of-service attack
Web search query
Click fraud
Computing
Spamming
Internet

SBotMiner: Large Scale Search Bot Detection Fang Yu, Yinglian Xie, and Qifa Ke Microsoft Research Silicon Valley Mountain View, CAUSA fangyu,yxie,

Add to Reading List

Source URL: www.wsdm-conference.org

Download Document from Source Website

File Size: 1,14 MB

Share Document on Facebook

Similar Documents

F100 Airline Case Study  INTERNATIONAL AIRLINE FIGHTS FARE SCRAPERS

F100 Airline Case Study INTERNATIONAL AIRLINE FIGHTS FARE SCRAPERS

DocID: 1rmQW - View Document

The Turing Test Track of the 2012 Mario AI Championship: Entries and Evaluation Noor Shaker, Julian Togelius, Georgios N. Yannakakis, Likith Poovanna, Vinay S. Ethiraj, Stefan J. Johansson, Robert G. Reynolds, Leonard K.

The Turing Test Track of the 2012 Mario AI Championship: Entries and Evaluation Noor Shaker, Julian Togelius, Georgios N. Yannakakis, Likith Poovanna, Vinay S. Ethiraj, Stefan J. Johansson, Robert G. Reynolds, Leonard K.

DocID: 1rbfb - View Document

TRENDS REPORT 2016 Mid-Year Update JULY 2016 INTRODUCTION In our last Trends report, Entering the Age of Experience, we noted that

TRENDS REPORT 2016 Mid-Year Update JULY 2016 INTRODUCTION In our last Trends report, Entering the Age of Experience, we noted that

DocID: 1r6mJ - View Document

DIY Gamer Education box - 12 Week Session Overview How do you engage children that want to play computer games? Get them to make computer games. This is a series of 12 one hour sessions based around a DIY Gamer, that wil

DIY Gamer Education box - 12 Week Session Overview How do you engage children that want to play computer games? Get them to make computer games. This is a series of 12 one hour sessions based around a DIY Gamer, that wil

DocID: 1qVlA - View Document

Reverse Engineering Socialbot Infiltration Strategies in Twitter Carlos Freitas⇤ , Fabricio Benevenuto⇤ , Saptarshi Ghosh†‡ and Adriano Veloso⇤ † Max  ⇤ Universidade

Reverse Engineering Socialbot Infiltration Strategies in Twitter Carlos Freitas⇤ , Fabricio Benevenuto⇤ , Saptarshi Ghosh†‡ and Adriano Veloso⇤ † Max ⇤ Universidade

DocID: 1qOw0 - View Document