10. G. V. Cormack and T. R. Lynam. Trec 2005 spam track overview. In In Proc. 14th Text
REtrieval Conference (TREC 2005, 2005.
11. G. V. Cormack and T. R. Lynam. Online supervised spam filter evaluation. ACM Trans. Inf.
Syst., 25(3):11, 2007.
12. E. Denti, A. Omicini, and A. Ricci. tuProlog: A light-weight Prolog for Internet applications
and infrastructures. In I. Ramakrishnan, editor, Practical Aspects of Declarative Languages,
volume 1990 of LNCS, pages 184–198. Springer, 2001. 3rd International Symposium (PADL
2001), Las Vegas, NV, USA, 11–12 Mar. 2001. Proceedings.
13. E. T. B. Dimitri do B. DeFigueiredo and S. F. Wu. Trust is in the eye of the beholder.
UCDavis Technical Report CSE 2007-09.
14. D. Fetterly, M. Manasse, and M. Najork. Spam, damn spam, and statistics: using statistical
analysis to locate spam web pages. In WebDB ’04: Proceedings of the 7th International
Workshop on the Web and Databases, pages 1–6, New York, NY, USA, 2004. ACM.
15. M. Hu, A. Sun, and E.-P. Lim. Comments-oriented blog summarization by sentence extrac-
tion. In CIKM ’07: Proceedings of the sixteenth ACM conference on Conference on infor-
mation and knowledge management, pages 901–904, New York, NY, USA, 2007. ACM.
16. N. Jindal and B. Liu. Review spam detection. In WWW ’07: Proceedings of the 16th in-
ternational conference on World Wide Web, pages 1189–1190, New York, NY, USA, 2007.
ACM.
17. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for repu-
tation management in p2p networks. In WWW ’03: Proceedings of the 12th international
conference on World Wide Web, pages 640–651, New York, NY, USA, 2003. ACM.
18. Y.-R. Lin, H. Sundaram, Y. Chi, J. Tatemura, and B. L. Tseng. Splog detection using self-
similarity analysis on blog temporal dynamics. In AIRWeb ’07: Proceedings of the 3rd inter-
national workshop on Adversarial information retrieval on the web, pages 1–8, New York,
NY, USA, 2007. ACM.
19. R. D. Lins and P. Gonc¸alves. Automatic language identification of written texts. In SAC ’04:
Proceedings of the 2004 ACM symposium on Applied computing, pages 1128–1133, New
York, NY, USA, 2004. ACM.
20. D. Lopresti. Leveraging the CAPTCHA Problem, pages 97–110. 2005.
21. G. Mishne, D. Carmel, and R. Lempel. Blocking blog spam with language model disagree-
ment. In Proceedings of the First International Workshop on Adversarial Information Re-
trieval on the Web - AIRWeb 2005, pages 1–6. Lehigh University, Bethlehem, PA USA, 2005.
22. G. Mori and J. Malik. Recognizing objects in adversarial clutter: Breaking a visual captcha.
In CVPR (1), pages 134–144. IEEE Computer Society, 2003.
23. D. Nguyen and B. Widrow. Neural networks for self-learning control systems. Control
Systems Magazine, IEEE, 10(3):18–23, Apr 1990.
24. A. Ntoulas, M. Najork, M. Manasse, and D. Fetterly. Detecting spam web pages through
content analysis. In WWW ’06: Proceedings of the 15th international conference on World
Wide Web, pages 83–92, New York, NY, USA, 2006. ACM.
25. D. Sculley and G. M. Wachman. Relaxed online svms for spam filtering. In SIGIR ’07:
Proceedings of the 30th annual international ACM SIGIR conference on Research and de-
velopment in information retrieval, pages 415–422, New York, NY, USA, 2007. ACM.
26. J. Yan and A. S. E. Ahmad. Breaking visual captchas with naive pattern recognition al-
gorithms. Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third
Annual, pages 279–291, 10-14 Dec. 2007.
131