Pro Guard Malicious Social Network Account Based Online Promotions

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LBSNShield: Malicious Account Detection in Location-Based Social Networks

Yuan Xuan, Yang Chen , Huiying Li, Pan Hui, Lei Shi 1 School of Computer Science, Fudan University, China 2 Engineering Research Center of Cyber Security Auditing and Monitoring, Ministry of Education, China 3 The State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China 4 Department of Computer Science and Engineering, Hong Kong University of Science a...

متن کامل

An Online Social Network-based Recommendation System

We have previously proposed to implement a social network-based recommendation system that uses data from and interfaces with the BoardGameGeek (BGG) website. The end result system will be usable by members of BGG to get recommendations given both their ratings history and their friend relationships. This report details the steps that we have taken so far and the steps that still need to be don...

متن کامل

DeepScan: Exploiting Deep Learning for Malicious Account Detection in Location-Based Social Networks

The widespread location-based social networks (LBSNs) have immersed into our daily life. As an open platform, LBSNs typically allow all kinds of users to register accounts. Malicious attackers can easily join and post misleading information, often with the intention of influencing the users’ decision in urban computing environments. To provide reliable information and improve the experience for...

متن کامل

Understanding and Defending Against Malicious Identities in Online Social Networks

Understanding and Defending Against Malicious Identities in Online Social Networks

متن کامل

Identification of malicious nodes in an AODV pure ad hoc network through guard nodes

This paper presents a guard node based scheme to identify malicious nodes in Ad hoc on-Demand Vector (AODV) protocol. Each node calculates trust level of its neighboring nodes for route selection. Trust calculation process involves opinions of other nodes about the node whose trust level is to be determined. If a neighboring node has a trust level lower than predefined threshold value. it’s ide...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Emerging Trends in Engineering Research

سال: 2020

ISSN: 2347-3983

DOI: 10.30534/ijeter/2020/62842020