Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
13933 open access dissertations and theses found for:
if(Spam detection)  »   Refine Search
1.
Privacy Aware Social Information Retrieval and Spam Filtering Using Folksonomies
by Navarro Bullock, Beate, Ph.D.  Bayerische Julius-Maximilians-Universitaet Wuerzburg (Germany). 2015: 225 pages; 27766753.
2.
A structure based technique for spam detection and email classification
by Desai, Varun, M.S.  California State University, Long Beach. 2016: 56 pages; 10017844.
3.
Advances in online learning-based spam filtering
by Sculley, D., Ph.D.  Tufts University. 2008: 212 pages; 3320103.
4.
Graph-Based Approach on Social Data Mining
by Wang, Guan, Ph.D.  University of Illinois at Chicago. 2014: 167 pages; 3668648.
5.
Battling Spam and Sybils on the Social Web
by Wilson, Christo, Ph.D.  University of California, Santa Barbara. 2012: 329 pages; 3545102.
6.
Background and Occlusion Defenses Against Adversarial Examples and Adversarial Patches
by McCoyd, Michael J., Ph.D.  University of California, Berkeley. 2020: 75 pages; 28090541.
7.
Proactive cyberfraud detection through infrastructure analysis
by Kalafut, Andrew J., Ph.D.  Indiana University. 2010: 153 pages; 3423688.
8.
Anomaly Detection on Social Data
by Hanbo, Dai, Ph.D.  Singapore Management University (Singapore). 2013: 146 pages; 3601348.
10.
11.
Navigating the Malweb: Authentication Schemes for Mobile Devices
by Niu, Yuan, Ph.D.  University of California, Davis. 2011: 116 pages; 3474442.
12.
Using Spammers' Computing Resources for Volunteer Computing
by Bui, Thai Le Quy, M.S.  Portland State University. 2014: 90 pages; 1553892.
13.
An exploration of online spam prevention through geolocational filters
by Boukes, John, M.S.  California State University, Long Beach. 2012: 90 pages; 1522208.
14.
Examining eye fixation patterns during the Situation Present Assessment Method (SPAM) under varying levels of workload
by Miramontes, Adriana J., M.S.  California State University, Long Beach. 2017: 59 pages; 10253672.
15.
A policy analysis of phishing countermeasures
by Sheng, Xinguang (Steve), Ph.D.  Carnegie Mellon University. 2009: 181 pages; 3383412.
16.
Fast Optimization Algorithms for AUC Maximization
by Natole, Michael, Jr., Ph.D.  State University of New York at Albany. 2020: 119 pages; 27835831.
17.
Mine detection rats: Effects of repeated extinction on detection rates
by Mahoney, Amanda M., Ph.D.  Western Michigan University. 2012: 67 pages; 3531894.
18.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
19.
Mining social media communities and content
by Java, Akshay, Ph.D.  University of Maryland, Baltimore County. 2008: 186 pages; 3339175.
20.
Measuring and Analyzing Typosquatting Toward Fighting Abusive Domain Registrations
by Szurdi, Janos, Ph.D.  Carnegie Mellon University. 2020: 148 pages; 27994260.
21.
Real-Time Road Traffic Events Detection and Geo-Parsing
by Kumar, Saurabh, M.S.E.C.E.  Purdue University. 2018: 70 pages; 10842958.
22.
Study of W32/NetSky.Q worm and malicious website detection using packed malware string search
by Dongre, Ankush, M.S.  California State University, Long Beach. 2011: 94 pages; 1504450.
23.
Rydberg-Mediated Atomic Ensemble Entanglement and Hyperfine Qubit Detection
by Kwon, Minho, Ph.D.  The University of Wisconsin - Madison. 2019: 255 pages; 13862690.
24.
Air traffic controller trust in automation in NextGen
by Mirchi, Tannaz, M.S.  California State University, Long Beach. 2015: 88 pages; 1597782.
26.
Training trust in automation within a NextGen environment
by Higham, Tiana-Lynn M., M.S.  California State University, Long Beach. 2013: 77 pages; 1524202.
27.
An Examination of User Detection of Business eMail Compromise amongst Corporate Professionals
by Aviv, Shahar Sean, Ph.D.  Nova Southeastern University. 2019: 141 pages; 27667282.
28.
Botnet Detection Using Graph Based Feature Clustering
by Akula, Ravi Kiran, M.S.  Mississippi State University. 2018: 69 pages; 10751733.
29.
Structuring Disincentives for Online Criminals
by Leontiadis, Nektarios, Ph.D.  Carnegie Mellon University. 2014: 370 pages; 3691274.
30.
Detecting and characterizing malicious websites
by Xu, Li, Ph.D.  The University of Texas at San Antonio. 2014: 93 pages; 3637094.
1 - 30 of 13933 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest