The Social Media Spam

Authors

  • Shaziya Amity Institute Of Information Technpology, Amity University, India
  • Kanchan Hans Amity Institute Of Information Technpology, Amity University, India

Keywords:

Spam, Social Spam, Clustering, Detection, Techniques

Abstract

Individuals dependably speak with one another through distinctive interpersonal interaction locales and this is the simplest approach to impart to the companion and relatives who are not around us. However we regularly see that we generally get the unwanted or unwelcome messages, messages and notices from the unwanted individuals which makes us uncomfortable and this is not acknowledged by anyone. We mark this sorts of undesirable messages "social spam "and recommended the groupings approaches to discover this spams. By perceiving and assessing of different characteristics of the social spam on the person to person communication administrations we have turned out with the potential indicates that can help us to separate the spammers with the authentic clients. We have additionally shed some light on the order of the spams and procedures which can help us to uproot the obstructions which regularly occurred while utilizing the informal communication administrations. The devices and systems likewise give wellbeing to different expert systems administration and organizations in viewpoint of classified data.

References

Beate Krause Christoph Schmitz Andreas Hotho Gerd Stummehttp://www.kde.cs.uni-kassel.de

Benjamin Markines Ciro Cattuto2 Filippo Menczer1;Complex Networks Lagrange Laboratory,

Danesh Irani, SteveWebb, and Calton danesh, webb calton}@cc.gatech.edu

Nitin Jindal and Bing Liunitin.jindal@gmail.com, liub@cs.uic.edu

De Wang, Danesh Irani, and Calton Pu wang6, danesh, calton} @cc.gatech.edu

Congrui Huang, Qiancheng Jiang, and Yan Zhang Key Laboratory of Machine Perception, Ministry of Education

School of Electronics Engineering and Computer Science, PekingUniversityBeijinghcr@pku.edu.cn,{jiangqiancheng,zhy}@cis.pku.edu.cn.

Gilad MishneInformatics Institute, University of Amsterdam Kruislaan 403, 1098SJ Amsterdam The Netherlandsgilad@science.uva.nl

David Carmel, Ronny Lempel IBM Research Lab in Haifa Haifa 31905, Israel {carmel,rlempel}@il.ibm.com

Benjamin Markines1;2Ciro Cattuto2 Filippo Menczer1;2 1School of Informatics, Indiana University, Bloomington, Indiana, USA 2Complex Networks Lagrange Laboratory, Institute.

Downloads

Published

2014-06-30

How to Cite

[1]
Shaziya and K. Hans, “The Social Media Spam”, Int. J. Comp. Sci. Eng., vol. 2, no. 6, pp. 9–12, Jun. 2014.

Issue

Section

Review Article