Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for ''
published presentations and documents on DocSlides.
International Journal of Latest Engineering and Management Research I
by elina
ISSN: 2455 - 4847 www.ijlemr.com ǁ Volume 01 - I...
Detecting and Characterizing Social Spam Campaigns Hongyu Gao
by aaron
Detecting and Characterizing Social Spam Campaign...
The Buddhist who understood (your) Desire
by conchita-marotz
It’s not the consumers’ job to know what they...
Managing Vast Sources of Information
by briana-ranney
We are inundated with information. News sites are...
Spiders, crawlers, harvesters, bots
by olivia-moreira
Thanks to . B. Arms. R. Mooney. P. Baldi. P. Fras...
SharePoint 2013 Alternate Access Mappings
by yoshiko-marsland
and . Self-Service . S. ite Creation. Steve Pesch...
Hinrich Schütze and Christina
by min-jolicoeur
Lioma. Lecture . 20: Crawling. 1. Overview. . R....
Web Security Defense Against The Dark Arts
by conchita-marotz
Cedric Cochin 1 TBD. Intel Security - McAfee La...
Web Servers and URLs And Domain Names
by tatiana-dople
WWW vs. Internet. World Wide Web. An application ...
Robin Mullinix Systems Analyst
by ellena-manuel
GeorgiaFIRST. . Financials. PeopleSoft Query: Th...
Scalable URL Matching with Small Memory Footprint
by tawny-fly
David Hay . With . Anat Bremler-Barr, Daniel . Kr...
Jim Barton
by debby-jeon
Librarian. Glenside Public Library District. Web ...
Spiders, crawlers, harvesters, bots
by calandra-battersby
Thanks to . B. Arms. R. Mooney. P. Baldi. P. Fras...
Spam Campaign Cluster Detection Using Redirected URLs and R
by debby-jeon
Authors. Abu Awal Md Shoeb, Dibya Mukhopadhyay, S...
Ruby: An introduction -
by cheryl-pisano
Who. . am. I?. Maciej Mensfeld. 1/23. Presented...
The Koobface
by test
Botnet. and the Rise of Social Malware. Kurt Tho...
Load More...