hijacking by email: a new fraud method

نویسندگان

majid khadem-rezaiyan resident of community medicine, department of community medicine and public health, faculty of medicine, mashhad university of medical sciences, mashhad, ir iran

maliheh dadgar moghadam assistant professor of community medicine, department of community medicine and public health, faculty of medicine, mashhad university of medical sciences, mashhad, ir iran; faculty of medicine, ferdowsi campus, vakil abad blv, mashhad, ir iran. tel: +98-9155084676, fax: +98-5138002385

چکیده

research misconduct is not a new problem in the research field. however, in recent years, the researchers themselves could be a victim of a newly expanded trouble: being hijacked by email. being obsessive about publishing one’s research results and finding the “real journals” seems not to be enough in recent years. in this article we will have a closer look to this issue and discuss two real examples happened to us. at the end, there are a few tips which could be helpful in encountering with such issues. we hope that dessiminating such data could raise the public and academic awareness and finally eliminate the expansion of this fraud method.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

solution of security constrained unit commitment problem by a new multi-objective optimization method

چکیده-پخش بار بهینه به عنوان یکی از ابزار زیر بنایی برای تحلیل سیستم های قدرت پیچیده ،برای مدت طولانی مورد بررسی قرار گرفته است.پخش بار بهینه توابع هدف یک سیستم قدرت از جمله تابع هزینه سوخت ،آلودگی ،تلفات را بهینه می کند،و هم زمان قیود سیستم قدرت را نیز برآورده می کند.در کلی ترین حالتopf یک مساله بهینه سازی غیر خطی ،غیر محدب،مقیاس بزرگ،و ایستا می باشد که می تواند شامل متغیرهای کنترلی پیوسته و گ...

The ZeroAccess Auto-Clicking and Search-Hijacking Click Fraud Modules

ZeroAccess is a large sophisticated botnet whose modular design allows new “modules” to be downloaded on demand. Typically each module corresponds to a particular scam used to monetize the platform. However, while the structure and behavior of the ZeroAccess platform is increasingly wellunderstood, the same cannot be said about the operation of these modules. In this report, we fill in some of ...

متن کامل

Analysis of Email Fraud detection using WEKA Tool

—Data mining is also being useful to give solutions for invasion finding and auditing. While data mining has several applications in protection, there are also serious privacy fears. Because of email mining, even inexperienced users can connect data and make responsive associations. Therefore we must to implement the privacy of persons while working on practical data mining. Using K-mean cluste...

متن کامل

A New Method for Color Gamut Mapping by Genetic Algorithm

To reproduce an image, it is necessary to map out of gamut colors of the image to destination gamut. It is clear that the best color gamut mapping introduces the perceptually closest image to the original one. In this study, a new color gamut mapping is purposed by the aid of Genetic Algorithm (GA). The color difference between the original and mapped images based on S-LAB formula was chosen as...

متن کامل

Email Grouping Method

In this paper we presents a neural network based system for automated email grouping into activities found in the email messageEmail Grouping Method (EGM). Email users spend a lot of time reading, replying and organizing their emails and this seems to be time consuming and sometimes can resolves to less performance of daily duty, and un-necessary distractions. A new system that can manage mails...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
razavi international journal of medicine

جلد ۴، شماره ۲، صفحات ۰-۰

کلمات کلیدی

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023