Abstract — Search engine spamming is a practice of misleading the search engine and increasing the page rank of undeserving websites. The black hat search engine optimization (SEO) techniques leads to untrustworthy results for search engines. Some commonly used black hat techniques has been characterized and proposed a new way to counter those techniques using link based spam detection technique. This technique enhances discovering of the target page and it investigates the problem of protecting privacy for publishing search engine logs. With the exponential growth of the available information on the WWW, current search engines do not just store and index web pages, they also store and mine information about their users. Hence the attackers...
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of u...
Nowadays it is easy to track web users among websites: cookies, web bugs or browser fingerprints are...
Abstract—URLs often utilize query strings (i.e., key-value pairs appended to the URL path) as a mean...
Search engine companies collect the “database of intentions,” the histories of their users' search q...
With the search engines' increasing importance in people's life, there are more and more attempts to...
Abstract—Search engine companies collect the “database of intentions”, the histories of their users ...
Abstract We propose a method for search privacy on the Internet, focusing on enhancing plausible den...
This paper is concerned in the full-text searching problematic and possibilities of influencing sear...
Web spam refers to some techniques, which try to manipulate search engine ranking algorithms in orde...
Releasing Web query logs which contain valuable infor-mation for research or marketing, can breach t...
User privacy on the internet is an important and unsolved problem. So far, no sufficient and compreh...
International audienceQuerying Web search engines is by far the most frequent activity performed by ...
High ranking of a Web site in search engines can be directly correlated to high revenues. This ampli...
To protect user privacy in the search engine context, most current approaches, such as private infor...
This paper is concerned with mining link spams (e.g., link farm and link exchange) from search engin...
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of u...
Nowadays it is easy to track web users among websites: cookies, web bugs or browser fingerprints are...
Abstract—URLs often utilize query strings (i.e., key-value pairs appended to the URL path) as a mean...
Search engine companies collect the “database of intentions,” the histories of their users' search q...
With the search engines' increasing importance in people's life, there are more and more attempts to...
Abstract—Search engine companies collect the “database of intentions”, the histories of their users ...
Abstract We propose a method for search privacy on the Internet, focusing on enhancing plausible den...
This paper is concerned in the full-text searching problematic and possibilities of influencing sear...
Web spam refers to some techniques, which try to manipulate search engine ranking algorithms in orde...
Releasing Web query logs which contain valuable infor-mation for research or marketing, can breach t...
User privacy on the internet is an important and unsolved problem. So far, no sufficient and compreh...
International audienceQuerying Web search engines is by far the most frequent activity performed by ...
High ranking of a Web site in search engines can be directly correlated to high revenues. This ampli...
To protect user privacy in the search engine context, most current approaches, such as private infor...
This paper is concerned with mining link spams (e.g., link farm and link exchange) from search engin...
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of u...
Nowadays it is easy to track web users among websites: cookies, web bugs or browser fingerprints are...
Abstract—URLs often utilize query strings (i.e., key-value pairs appended to the URL path) as a mean...