Impersonating Myself on the Internet
نویسنده
چکیده
This paper describes the implementation of a computer program that responds to chat messages sent by users of an internet chat client. The program uses a statistical model of previous chat messages sent and received by the author to determine possible meanings of incoming messages and select an appropriate response. Two heuristics are also used to allow the program to respond in cases where the meaning of a message is unclear.
منابع مشابه
Anonymous authentication for privacy-preserving IoT target-driven applications
The Internet of Things (IoT) will be formed by smart objects and services interacting autonomously and in real-time. Recently, Alcaide et al. proposed a fully decentralized anonymous authentication protocol for privacy-preserving IoT target-driven applications. Their system is set up by an ad-hoc community of decentralized founding nodes. Nodes can interact, being participants of cyberphysical ...
متن کاملImpersonating-Resilient Dynamic Key Management for Large-Scale Wireless Sensor Networks
Key management in a large portion of ubiquitous sensor networks has been a challenge due to the limited capabilities of their wireless communicating and battery-powered sensors. Moreover, an attacker physically capturing even a few nodes hampers the entire network security by impersonating nodes to inject false data in an undetected manner. To efficiently protect from such impersonating by node...
متن کاملEating disorder support resources on the Web
I know that I have an eating disorder...I starve myself for weeks eating as little as possible, then stuff myself to the point where I am sick. I want to know where I can go, through e-mail or over the internet, to talk to someone anonymously. I am too embarrassed to tell anyone around me. I realize how bad this is because of how it is affecting my life and happiness. I am trying to reach out.....
متن کاملLEARNING TO DETECT PHISHING URLs
Phishing attacks have been on the rise and performing certain actions such as mouse hovering, clicking, etc. on malicious URLs may cause unsuspecting Internet users to fall victims of identity theft or other scams. In this paper, we study the anatomy of phishing URLs that are created with the specific intent of impersonating a trusted third party to trick users into divulging personal data. Unl...
متن کاملOnline eating disorder support resources
I know that I have an eating disorder... I starve myself for weeks eating as little as possible, then stuff myself to the point where I am sick. I want to know where I can go, through e-mail or over the internet, to talk to someone anonymously. I am too embarrassed to tell anyone around me. I realize how bad this is because of how it is affecting my life and happiness. I am trying to reach out....
متن کامل