نتایج جستجو برای: malicious user

تعداد نتایج: 253175  

2007
Mortaza Kokabi

This paper present the design and function of magiran.com, a databse of periodicals published in Iran. It also attempts to answer the following questions: How many of the total periodicals published in Iran are covered by magiran? What is the subject coverage of the periodicals covered? Which subjects seem to have been given importance among the periodicals covered? How many of the periodicals ...

Journal: :CoRR 2015
Prateek Dewan Ponnurangam Kumaraguru

Online Social Networks (OSNs) witness a rise in user activity whenever an event takes place. Malicious entities exploit this spur in user-engagement levels to spread malicious content that compromises system reputation and degrades user experience. It also generates revenue from advertisements, clicks, etc. for the malicious entities. Facebook, the world’s biggest social network, is no exceptio...

Journal: :Future Internet 2017
Jingbo Zhang Lili Cai Shufang Zhang

Collaborative spectral sensing can fuse the perceived results of multiple cognitive users, and thus will improve the accuracy of perceived results. However, the multi-source features of the perceived results result in security problems in the system. When there is a high probability of a malicious user attack, the traditional algorithm can correctly identify the malicious users. However, when t...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

2013
Junyu Xiao Zhangwei Yang Feng Jiang

Trust security is one of the hotspot in manufacturing grid. The paper proposes a trust model to suit for manufacturing grid, based on domain trust model. It manages trust value of grid user from the introducing of user trust agent in autonomy domain. Furthermore, it considers the impact of time decay and the punishment of malicious transactions. The model is effective in reducing the malicious ...

Journal: :International Journal of Computer Applications 2013

2013

A Tor network popularly known as an anonymous network provides a way to access internet services anonymously through a series of routers without revealing users identity. A user almost remains unknown in the public networks and makes use of various facilities of his interest. Networks such as “Tor (The Onion Router)”,”Crowds” and “I2P” gained popularity in the past several years, but success of...

2017
Shivanshu Shrivastava

In cognitive radio based cooperative sensing systems, some secondary users are likely to act malicious. Such secondary users are called malicious users. An optimal application of Dixon's outlier detection scheme for detecting malicious users in a cognitive radio cooperative spectrum sensing system has recently been termed as the Sliding Window Dixon's test. The Sliding window Dixon's test appli...

Journal: :Computer Standards & Interfaces 2008
Giannakis Antoniou Leon Sterling Stefanos Gritzalis Parampalli Udaya

The rights of an Internet user acting anonymously conflicts with the rights of a Server victim identifying the malicious user. The ERPINA protocol, introduced in this paper, allows an honest user communicating anonymously with a Server through a PET, while the identity of a dishonest user is revealed. Prior research failed to distinguish objectively between an honest user and an attacker; and a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید