Unorganized malicious attacks detection

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unorganized Malicious Attacks Detection

Recommender system has attracted much attention during the past decade, and many attack detection algorithms have been developed for better recommendation. Most previous approaches focus on the shilling attacks, where the attack organizer fakes a large number of user profiles by the same strategy to promote or demote an item. In this paper, we study a different attack style: unorganized malicio...

متن کامل

Detection of malicious attacks by Meta classification algorithms

-------------------------------------------------------------------ABSTRACT--------------------------------------------------------------We address the problem of malicious node detection in a network based on the characteristics in the behavior of the network. This issue brings out a challenging set of research papers in the recent contributing a critical component to secure the network. This ...

متن کامل

Securing Collaborative Filtering Against Malicious Attacks Through Anomaly Detection

Collaborative filtering recommenders are highly vulnerable to malicious attacks designed to affect predicted ratings. Previous work related to detecting such attacks has focused on detecting profiles. Approaches based on profile classification to a large extent depend on profiles conforming to known attack models. In this paper we examine approaches for detecting suspicious rating trends based ...

متن کامل

EA Optimization of Networks Against Malicious Attacks

The importance of considering the network structure in studying the behavior of many modern infrastructures and naturally occurring complex systems, has become increasingly clear. The topology of many real world networks makes them vulnerable with respect to targeted attacks on their components, and there has been a recent surge of interest in determining how one can optimize the structure of t...

متن کامل

Are blockchains immune to all malicious attacks?

Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchai...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SCIENTIA SINICA Informationis

سال: 2018

ISSN: 1674-7267

DOI: 10.1360/n112017-00112