Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. Conventional Twitter spam detection schemes utilize account features such as the ratio of tweets containing URLs and the account creation date, or relation features in the Twitter graph. These detection schemes are ineffective against feature fabrications or consume much time and resources. Conventional suspicious URL detection schemes utilize several features including lexical features of URLs, URL redirection, HTML content, and dynamic behavior. However, evading techniques such as time-based evasion and crawler evasion exist. In this paper, we propose WARNINGBIRD, a suspicious Real-Time URL detection system for Twitter. Our system investigat...
The drastic development in the information accessible on the World Wide Web has made the employment ...
Network coding (NC) is a relatively recent novel technique that generalises network operation beyon...
This thesis presents a novel application of machine learning technology to automate network security...
“GSU Connects US” is a posting based student communication website. Today on the internet there are ...
The interest for data mining techniques has increased tremendously during the past decades, and nume...
Oracle, IBM, Microsoft and Teradata own a large portion of the information on the planet. By that on...
The goal of this project is to design a system for managing multiple data source through networks. T...
Master of ScienceDepartment of Computing and Information SciencesWilliam H. HsuClustering in data mi...
Master of ScienceDepartment of Computing and Information SciencesMitchell L. NeilsenSafety-critical ...
Cloud Computing has grown exponentially in popularity in the last few years, becoming a key technolo...
Master of ScienceDepartment of Computing and Information SciencesDaniel AndresenThis report consider...
The ICTG research group is currently working on a Stroke Rehabilitation virtual reality system to i...
Spatial data collection in an organizational setup is growing in terms of the number of applications...
Master of ScienceDepartment of Computing and Information SciencesDaniel A. AndresenThe Online Shoppi...
The main objective of this project is to build an android application which can help people plan an ...
The drastic development in the information accessible on the World Wide Web has made the employment ...
Network coding (NC) is a relatively recent novel technique that generalises network operation beyon...
This thesis presents a novel application of machine learning technology to automate network security...
“GSU Connects US” is a posting based student communication website. Today on the internet there are ...
The interest for data mining techniques has increased tremendously during the past decades, and nume...
Oracle, IBM, Microsoft and Teradata own a large portion of the information on the planet. By that on...
The goal of this project is to design a system for managing multiple data source through networks. T...
Master of ScienceDepartment of Computing and Information SciencesWilliam H. HsuClustering in data mi...
Master of ScienceDepartment of Computing and Information SciencesMitchell L. NeilsenSafety-critical ...
Cloud Computing has grown exponentially in popularity in the last few years, becoming a key technolo...
Master of ScienceDepartment of Computing and Information SciencesDaniel AndresenThis report consider...
The ICTG research group is currently working on a Stroke Rehabilitation virtual reality system to i...
Spatial data collection in an organizational setup is growing in terms of the number of applications...
Master of ScienceDepartment of Computing and Information SciencesDaniel A. AndresenThe Online Shoppi...
The main objective of this project is to build an android application which can help people plan an ...
The drastic development in the information accessible on the World Wide Web has made the employment ...
Network coding (NC) is a relatively recent novel technique that generalises network operation beyon...
This thesis presents a novel application of machine learning technology to automate network security...