نتایج جستجو برای: Malicious User
تعداد نتایج: 253175 فیلتر نتایج به سال:
Abstract In the present study, an extended classification of Internet users penetrating in computer networks and a definition motivation as psychological emotional state main prerequisites for modelling network intruder’s activity are suggested. A mathematical model quadratic function malicious individual’s behavior impact on based three quantified factors, motivation, satisfaction system prote...
Cooperative spectrum sensing (CSS) can improve spectrum sensing accuracy, but it can be injured due to potential attacks from malicious cognitive radio user who reports false sensing results to the fusion center (FC). Many researchers focus on reducing the effect of malicious users on the accuracy of spectrum sensing. A promising method to detect malicious users is to determine their abnormal s...
Since the advent of the information era, the Internet has brought various positive effects in everyday life. Nevertheless, recently, problems and side-effects have been noted. Internet witch-trials and spread of pornography are only a few of these problems.In this study, problems and causes of malicious replies on internet boards were analyzed, using the key ideas of game theory. The study prov...
Unfortunately, among internet services, users are faced with several unwanted messages that are not even related to their interests and scope, and they contain advertising or even malicious content. Spam email contains a huge collection of infected and malicious advertising emails that harms data destroying and stealing personal information for malicious purposes. In most cases, spam emails con...
In e-commerce, online retailers are usually suffering from professional malicious users (PMUs), who utilize negative reviews and low ratings to their consumed products on purpose threaten the for illegal profits. PMUs difficult be detected because they masking strategies disguise themselves as normal users. Specifically, there three challenges PMU detection: 1) do not conduct any abnormal or in...
This letter proposes a novel malicious user prediction model based on quantum machine learning that estimates the vicious entity present in communication system precedently before allocating data distributed environments. The proposed scrutinizes behavior of each and probable breaches using developed predictor unit. computes essential scores associated with request for process unit by generatin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید