Preventing Online Social Deception using Deception Matrix

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Deception Tactics and Counterfeit Deception in Online Environments

With widespread globalization happening at an alarming speed, the manufacturing and copying of goods has become a matter of routine for counterfeiters. The Internet has provided a new advantage for counterfeiters the opportunity to sell goods without prior consumer inspection. Leveraging this opportunity, deceitful purveyors of imitation goods engage in unethical practices such as selling count...

متن کامل

Deception as a Social Strategy

Deception can be advantageous to a deceiver when the truth conflicts with his or her goals be they personal or social, selfless or selfish. Thus it is that people regularly use deception to avoid conflict with others, to avoid punishment or embarrassment, to fit into a group, to harm, protect or help others, and for material or non-material benefit to themselves. While there are many ways in wh...

متن کامل

Online Auction Deception Using a Shill Bidding Agent

Shill bidding is the act of using bids in an online auction to drive up the final price for the seller, thereby defrauding legitimate bidders. While ‘shilling’ is recognized as a problem and shill bidding is strictly forbidden in online auctions, presently there is little to no established means of defense against shills. This paper presents a software bidding agent that follows a shill bidding...

متن کامل

Eye Gazing Behaviors in Online Deception

Psychophysiological behaviors of deceivers have been used as an effective leakage channel of face-toface deception. Among various psychophysiological behaviors, eye movement has been identified as one of the most reliable sources of deception behavior in face-to-face communication. However, empirical studies of eye movement behavior in online deception remain scarce. In this research, we invest...

متن کامل

Online Deception Attack Against Remote State Estimation

Security issue has become a new hotspot in cyber-physical systems (CPS) research field in recent years due to the vulnerability of CPS to security threats. This paper focuses on stealthy deception attack in remote state estimation, which is one typical attack in CPS. From the standpoint of deception attacker, we investigates how to design proper deception attack strategy to degrade the state es...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IAES International Journal of Artificial Intelligence (IJ-AI)

سال: 2016

ISSN: 2252-8938,2089-4872

DOI: 10.11591/ijai.v5.i1.pp35-40