نتایج جستجو برای: bot
تعداد نتایج: 2803 فیلتر نتایج به سال:
Abstract In human-chatbot interaction, users casually and regularly offend abuse the chatbot they are interacting with. The current paper explores relationship between humanlikeness on one hand sexual advances verbal aggression by user other hand. 283 conversations Cleverbot its were harvested analysed. Our results showed higher counts of comments towards when appeared more humanlike in behavio...
This exploratory study used the R Statistical Software to perform Monte Carlo simulation of time maps, which characterize events based on the elapsed time since the last event and the time that will transpire until the next event, and compare them to time maps from real Twitter users. Time maps are used to explore differences in the interarrival patterns of Tweets between human users, humans wh...
We present an analysis of the iKee.B (duh) Apple iPhone bot client, captured on November 25, 2009. The bot client was released throughout several countries in Europe, with the initial purpose of coordinating its infected iPhones via a Lithuanian botnet server. This report details the logic and function of iKee’s scripts, its configuration files, and its two binary executables, which we have rev...
Bots are malicious software components used for generating spams, launching denial of service attacks, phishing, identity theft and information exfiltration and such other illegal activities. Bot detection is an area of active research in recent times. Here we propose a bot detection mechanism for a single host. A user traffic profile is used to filter out normal traffic generated by the host. ...
Bots, which are new malignant programs are hard to detect by signature based pattern matching techniques. In this research, we focused on a unique function of the bots the remote control channel (C&C session). We clarified that the C&C session has unique characteristics that come from the behavior of bot programs. Accordingly, we propose an alternative technique to identify computers compromise...
* Part of this work was done as a National Research Council Fellow at the University of California, Berkeley. 1 Bonner, J. T., Am. J. Bot., 31, 175 (1944). 2 Skupienski, F. X., Recherches Sur Le Cycle Evolutif Des Certains Myxomycetes, Paris, 1920. 3 Kniep, H., Die Sexualitdt der niederen Pflanzen, Gustav Fischer, Jena, 1928. 4 Raper, K. B., The Quarterly Revie-w of Biology, 26, 169 (1951). 6 E...
The development of reliable, robust and capable service robot platforms is expensive and time consuming. On the other hand, stable hardware is a prerequisite to be able to concentrate on the targeted research area. This paper proposes a strategy to make such high-end service robot platforms available as research platform, by means of the example of CareO-bot ® 3 developed at Fraunhofer IPA. Sev...
Larvae of the bot fly Cuterebra emasculator Fitch infest tree squirrels and chipmunks from the Atlantic Ocean to just west of the Mississippi River and from southern Canada to the Gulf Coast of the United States. Whether the species is present in all states and provinces in this region is not well documented. Because there are few published records of C. emasculator in South Carolina, we gather...
Sheryl Brahnam Missouri State University 1909 S. National Springfield, MO 65804 USA [email protected] In this paper, I present a preliminary study that examines the sexual comments and insults users directed at three conversational agents that differed in the gender impressions of their embodiment. The three types of embodiment explored in this study are male, female, and neuter-robotic. Resu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید