SlideShare is now on Android. 15 million presentations at your fingertips.  Get the app

×
  • Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
 

Overcoming Spammers in Twitter – A Tale of Five Algorithms

by Working at University of Oviedo on Jun 15, 2010

  • 5,108 views

Micro-blogging services such as Twitter can develop into valuable sources of up-to-date information provided the spam problem is overcome. Thus, separating the most relevant users from the spammers is ...

Micro-blogging services such as Twitter can develop into valuable sources of up-to-date information provided the spam problem is overcome. Thus, separating the most relevant users from the spammers is a highly pertinent question for which graph centrality methods can provide an answer. In this paper we examine the vulnerability of five different algorithms to linking malpractice in Twitter and propose a first step towards "desensitizing" them against such abusive behavior.

Statistics

Views

Total Views
5,108
Views on SlideShare
4,926
Embed Views
182

Actions

Likes
14
Downloads
0
Comments
1

6 Embeds 182

http://webnik.dk 107
http://thenoisychannel.com 39
http://www.slideshare.net 31
http://twittertim.es 2
http://cmc.l50sw.com 2
http://www.iweb34.com 1

Accessibility

Categories

Upload Details

Uploaded via SlideShare as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

11 of 1 previous next

Post Comment
Edit your comment

Overcoming Spammers in Twitter – A Tale of Five Algorithms Overcoming Spammers in Twitter – A Tale of Five Algorithms Presentation Transcript