نتایج جستجو برای: fake accounts
تعداد نتایج: 63918 فیلتر نتایج به سال:
Mrs.V.Perathu Selvi Assistant Professor, Department of Computer Science, Francis Xavier Engineering College, Tirunelveli Email: [email protected] Ms.K.Raja Sundari Assistant Professor, Department of Computer Science, Francis Xavier Engineering College, Tirunelveli Email: [email protected] Mrs.P.J.Beslin Pajila Assistant Professor, Department of Computer Science, Francis Xavier Eng...
The massive spread of fake news has been identified as a major global risk and has been alleged to influence elections and threaten democracies. Communication, cognitive, social, and computer scientists are engaged in efforts to study the complex causes for the viral diffusion of digital misinformation and to develop solutions, while search and social media platforms are beginning to deploy cou...
Fake identities and Sybil accounts are pervasive in today’s online communities. They are responsible for a growing number of threats, including fake product reviews, malware and spam on social networks, and astroturf political campaigns. Unfortunately, studies show that existing tools such as CAPTCHAs and graph-based Sybil detectors have not proven to be effective defenses. In this paper, we de...
Cloud-based documents are inherently valuable, due to the volume and nature of sensitive personal and business content stored in them. Despite the importance of such documents to Internet users, there are still large gaps in the understanding of what cybercriminals do when they illicitly get access to them by for example compromising the account credentials they are associated with. In this pap...
The mechanisms of information diffusion in Online Social Networks (OSNs) have been studied extensively from various perspectives with some focus on identifying and modeling the role heterogeneous nodes. However, none these studies considered influence fake accounts human how this will affect rumor process. This paper aims to present a new model that characterizes bots process OSNs. proposed SIh...
We present a technique to identify Twitter users we trust to be regular Twitter users and not spam or fake accounts. The technique starts with an initial set of trusted users based on Twitter’s verified users and recursively includes other users the trusted users communicate with. Conversations must be initiated by trusted users. We show that this technique produces a set of users that is over ...
Cloaking-based location privacy preserving mechanisms have been widely adopted to protect users' location privacy while traveling on road networks. However, a fundamental limitation of such mechanisms is that users in the system are inherently trusted and assumed to always report their true locations. Such vulnerability can lead to a new class of attacks called location injection attacks which ...
This paper presents preliminary results of using authorship attribution methods for the detection of sockpuppeteering in Wikipedia. Sockpuppets are fake accounts created by malicious users to bypass Wikipedia’s regulations. Our dataset is composed of the comments made by the editors on the talk pages. To overcome the limitations of the short lengths of these comments, we use an voting scheme to...
Received: 3 October 2005 Accepted: 3 October 2005 One of my most memorable experiences with Claudio occured in Cleveland about 10 years ago. I was serving as department chair, and had organized a semester long research seminar, bringing one great scholar in for a full week, every week of the term. During their week in residence, the visitors would give two seminars and meet informally with facu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید