نتایج جستجو برای: fake accounts
تعداد نتایج: 63918 فیلتر نتایج به سال:
As the popularity of the social media increases, as evidenced in Twitter, Facebook and China’s Renren, spamming activities also picked up in numbers and variety. On social network sites, spammers often disguise themselves by creating fake accounts and hijacking normal users’ accounts for personal gains. Different from the spammers in traditional systems such as SMS and email, spammers in social...
Content polluters, or bots that hijack a conversation for political or advertising purposes are a known problem for event prediction, election forecasting and when distinguishing real news from fake news in social media data. Identifying this type of bot is particularly challenging, with state-of-the-art methods utilising large volumes of network data as features for machine learning models. Su...
This work seeks to develop an analytical model for the per-node throughput analysis of IEEE 802.11 WLAN networks with hidden nodes by extending Bianchi’s model. With the analytic model we derive the per-node throughput of each node and quantify the impact of hidden nodes on per-node throughput. Through our analysis, we find that nodes having more hidden nodes are likely to have worse throughput...
Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, theMAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, of...
The fake supergravity method is applied to 5-dimensional asymptotically AdS spacetimes containing gravity coupled to a real scalar and an abelian gauge field. The motivation is to obtain bulk solutions with R × S3 symmetry in order to explore the AdS/CFT correspondence when the boundary gauge theory is on R × S3. A fake supergravity action, invariant under local supersymmetry through linear ord...
How can we tell when accounts are fake or real in a social network? And how can we tell which accounts belong to liberal, conservative or centrist users? Often, we can answer such questions and label nodes in a network based on the labels of their neighbors and appropriate assumptions of homophily (”birds of a feather flock together”) or heterophily (”opposites attract”). One of the most widely...
During the past decade, microblog services have been extensively utilized by millions of business and private users as one of the most powerful information broadcasting tools. For example, Twitter attracted many social science researchers due to its high popularity, constrained format of thought expression, and the ability to reflect actual trends. However, unstructured data from microblogs oft...
Social networks have become an everyday tool in our lives and different social networks have different target groups. Among them LinkedIn is greatly preferred by the people who are in the professional occupations. With the rapid growth of social networks, people tend to misuse them for unethical and illegal conducts. Creation of a fake profile becomes such adversary effect which is difficult to...
The conditions to induce appreciable CP-and T-odd effects in neutrino oscillations are discussed. The propagation in matter leads to fake CP-and CPT-odd asymmetries, besides a Bohm-Aharonov type modification of the interference pattern. We study the separation of fake and genuine CP violation by means of energy and distance dependence.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید