نتایج جستجو برای: fake accounts

تعداد نتایج: 63918  

Journal: :Information Technology and Management 2009
Ahmed Abbasi Hsinchun Chen

The ability to automatically detect fraudulent escrow websites is important in order to alleviate online auction fraud. Despite research on related topics, such as web spam and spoof site detection, fake escrow website categorization has received little attention. The authentic appearance of fake escrow websites makes it difficult for Internet users to differentiate legitimate sites from phonie...

2014
Tibor Macko

A fake lens space is an orbit space of a free action of a finite cyclic group on a sphere and as such it is a generalization of a classical lens space. The invariants of fake lens spaces described here are their homotopy groups, homology groups, a certain k-invariant, the Reidemeister torsion, the ρ-invariant and certain splitting invariants. We survey the classification of fake lens spaces whi...

Journal: :Computer Networks 2014
Rubén Cuevas Rumín Michal Kryczka Roberto Gonzalez Ángel Cuevas Arturo Azcorra

In this paper we conduct a large scale measurement study in order to analyse the fake content publishing phenomenon in the BitTorrent Ecosystem. Our results reveal that fake content represents an important portion (35%) of those files shared in BitTorrent and just a few tens of users are responsible for 90% of this content. Furthermore, more than 99% of the analysed fake files are linked to eit...

2010
Raymond Y. K. Lau Stephen Shaoyi Liao Kaiquan Xu

Because of the sheer volume of consumer reviews posted to the Internet, a manual approach for the detection and analysis of fake reviews is not practical. However, automated detection of fake reviews is a very challenging research problem given the fact that fake reviews could just look like legitimate reviews. Guided by the design science research methodology, one of the main contributions of ...

2001
SELMAN AKBULUT Selman Akbulut

LET S3 G S’ denote the twisted S3 bundle over S’. In this paper we will demonstrate an imbedding of a 2-sphere f:S* 4 S3 G S’ #S* x S* such that twisting S3 g S’ #S’ x S* along f(S*) (Gluck construction) produces a fake manifold M4. In fact M4 coincides with the fake S3 2 S’ #S* x S*‘s of [l] and 123. More specifically, if IV;= M-int(B3 g S’) (a fake B3 z S’ # S* x S*) and Q4 is the Cappell-Sha...

2008
Yuichiro Kanzaki Akito Monden Masahide Nakamura Ken-ichi Matsumoto

This paper proposes an easy-to-use instruction hiding method to protect software from malicious reverse engineering attacks. Given a source program (original) to be protected, the proposed method (1) takes its modified version (fake) as an input, (2) differences in assembly code instructions between original and fake are analyzed, and, (3) self-modification routines are introduced so that fake ...

2014
Megha Thakur Amrit Kaur

This paper presents the various fake currency detection techniques. Fake currency is imitation currency produced without the legal sanction of the state or government. Producing or using fake currency is a form of fraud or forgery. Over the past few years, as a result of the great technological advances in colour printing, duplicating and scanning, counterfeiting problems have become more and m...

2014
Qinghai Gao

Fingerprint is a widely used biometrics. Its extensive usage motivates imposter to fabricate fake fingerprints. Vitality detection has been proposed to prevent counterfeit finger attack. Currently the detection can be done either during the process of acquiring fingerprint image or by comparing multiple sequentially acquired images. It is an ongoing research problem to detect whether a given fi...

Journal: :Cognitive, affective & behavioral neuroscience 2004
Erin L Austen Salvador Soto-Faraco James T Enns Alan Kingstone

Observers can mislocalize a tactile target delivered to an unseen hand if a visible rubber glove is positioned next to a pair of distractor lights that flash in correlation with the tactile target (Pavani, Spence, & Driver, 2000). In the present study, we explored visual, tactile, and postural factors that influence this fake hand effect. Comparison with baseline conditions revealed that the fa...

2011
Brett Stone-Gross Ryan Abman Richard A. Kemmerer Christopher Krügel Douglas G. Steigerwald

Fake antivirus (AV) programs have been utilized to defraud millions of computer users into paying as much as one hundred dollars for a phony software license. As a result, fake AV software has evolved into one of the most lucrative criminal operations on the Internet. In this paper, we examine the operations of three large-scale fake AV businesses, lasting from three months to more than two yea...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید