منابع مشابه
Unorganized Malicious Attacks Detection
Recommender system has attracted much attention during the past decade, and many attack detection algorithms have been developed for better recommendation. Most previous approaches focus on the shilling attacks, where the attack organizer fakes a large number of user profiles by the same strategy to promote or demote an item. In this paper, we study a different attack style: unorganized malicio...
متن کاملDetection of malicious attacks by Meta classification algorithms
-------------------------------------------------------------------ABSTRACT--------------------------------------------------------------We address the problem of malicious node detection in a network based on the characteristics in the behavior of the network. This issue brings out a challenging set of research papers in the recent contributing a critical component to secure the network. This ...
متن کاملSecuring Collaborative Filtering Against Malicious Attacks Through Anomaly Detection
Collaborative filtering recommenders are highly vulnerable to malicious attacks designed to affect predicted ratings. Previous work related to detecting such attacks has focused on detecting profiles. Approaches based on profile classification to a large extent depend on profiles conforming to known attack models. In this paper we examine approaches for detecting suspicious rating trends based ...
متن کاملEA Optimization of Networks Against Malicious Attacks
The importance of considering the network structure in studying the behavior of many modern infrastructures and naturally occurring complex systems, has become increasingly clear. The topology of many real world networks makes them vulnerable with respect to targeted attacks on their components, and there has been a recent surge of interest in determining how one can optimize the structure of t...
متن کاملAre blockchains immune to all malicious attacks?
Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchai...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SCIENTIA SINICA Informationis
سال: 2018
ISSN: 1674-7267
DOI: 10.1360/n112017-00112