Full Paper View Go Back

Methods for Web-Spam Detection on web: Principles and Algorithms

Mrs. Parminder Kaur .1

  1. Shri Venkateshwara University, Gajraula, India.

Section:Research Paper, Product Type: Isroset-Journal
Vol.6 , Issue.2 , pp.119-125, Apr-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v6i2.119125


Online published on Apr 30, 2018


Copyright © Mrs. Parminder Kaur . . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Mrs. Parminder Kaur ., “Methods for Web-Spam Detection on web: Principles and Algorithms,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.2, pp.119-125, 2018.

MLA Style Citation: Mrs. Parminder Kaur . "Methods for Web-Spam Detection on web: Principles and Algorithms." International Journal of Scientific Research in Computer Science and Engineering 6.2 (2018): 119-125.

APA Style Citation: Mrs. Parminder Kaur ., (2018). Methods for Web-Spam Detection on web: Principles and Algorithms. International Journal of Scientific Research in Computer Science and Engineering, 6(2), 119-125.

BibTex Style Citation:
@article{Kaur ._2018,
author = {Mrs. Parminder Kaur .},
title = {Methods for Web-Spam Detection on web: Principles and Algorithms},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {4 2018},
volume = {6},
Issue = {2},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {119-125},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=619},
doi = {https://doi.org/10.26438/ijcse/v6i2.119125}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i2.119125}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=619
TI - Methods for Web-Spam Detection on web: Principles and Algorithms
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Mrs. Parminder Kaur .
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 119-125
IS - 2
VL - 6
SN - 2347-2693
ER -

339 Views    221 Downloads    96 Downloads
  
  

Abstract :
A excess of big data applications are emerging which is being researched in the field of information technology which needs recognition of pattern and online classification of large dataset fetched from various forum working on online platform. The present research focuses on systematically analyzing and categorizing models that detect review spam. However, spamming is considered as critical issue in web mining. To handle the difficult queries, research is conducted on algorithm for data mining and knowledge discovery. I started with the introduction of web mining, web spam and process of mining Next, the study proceeds to assess them in terms of accuracy and results. Different detection techniques have different strengths and weaknesses and thus favor different detection contexts. The simulation output of our approach on different queries which shows effectiveness of our proposed framework. As the final part, we provide our conclusion and prospect.

Key-Words / Index Term :
Web, Internet, Server, Spam, Detection Technique

References :
[1]. Abe, T., Miyake, J., Kawashima, M., & Takahashi, K. (2005).“Spam filtering withcryptographic ad-hoc email addresses”, In IEEE SAINT-W02005, pp. 114–117.
[2]. Agrawal, B., Kumar, N., &Molle, M. (2005). “Controlling spam emails at the routers”. In Proceedings of the IEEE International Conference on Communications, ICC 2005,Vol. 3, pp. 1588–1592.
[3]. Aharon, M., Elad, M. &Bruckstein, A., (2006),“K-SVD: an algorithm for designing overcomplete dictionaries for sparse representation”, Signal Process IEEE Trans 54(11):4311–4322.
[4]. Ahonen, T., Hadid, A., Pietikainen, M., (2006),“Face description with local binary patterns: application to face recognition”,PatternAnalMachIntell IEEE Trans 28(12):2037–2041.
[5]. Algur, S., &Pendari N. (2012), “Hybrid spamicity score approach to web spam detection” in Pattern Recognition, Informatics and Medical Engineering (PRIME), 2012 International Conference on. IEEE, pp. 36–40.
[6]. Amleshwaram, A., Reddy, N., Yadav, S., Gu, G., & Yang, C. (2013.),“Cats:Characterizing automation of twitter spamme”, Technical report, Department of Electrical and Computer Engineering Texas A&M University, College Station, TX 77843.
[7]. Androutsopoulos, I., Koutsias J., Chandrinos K. V., and Spyropoulos C. D. (2000).‘‘AnEvaluation of Naive Bayesian Anti-Spam Filtering.’’In Proceedings of the Workshopon Machine Learning in the New Information Age, 11th European Conferenceon Machine Learning, edited by G. Potamias, V. Moustakis, and M. vanSomeren, 9–17. Barcelona, Spain: ECML.
[8]. Algur, S., &Pendari N. (2012), “Hybrid spamicity score approach to web spam detection”, in Pattern Recognition, Informatics and Medical Engineering (PRIME), 2012 International Conference on. IEEE, pp. 36–40.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation