Pro Guard Malicious Social Network Account Based Online Promotions
نویسندگان
چکیده
منابع مشابه
LBSNShield: Malicious Account Detection in Location-Based Social Networks
Yuan Xuan, Yang Chen , Huiying Li, Pan Hui, Lei Shi 1 School of Computer Science, Fudan University, China 2 Engineering Research Center of Cyber Security Auditing and Monitoring, Ministry of Education, China 3 The State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China 4 Department of Computer Science and Engineering, Hong Kong University of Science a...
متن کاملAn Online Social Network-based Recommendation System
We have previously proposed to implement a social network-based recommendation system that uses data from and interfaces with the BoardGameGeek (BGG) website. The end result system will be usable by members of BGG to get recommendations given both their ratings history and their friend relationships. This report details the steps that we have taken so far and the steps that still need to be don...
متن کاملDeepScan: Exploiting Deep Learning for Malicious Account Detection in Location-Based Social Networks
The widespread location-based social networks (LBSNs) have immersed into our daily life. As an open platform, LBSNs typically allow all kinds of users to register accounts. Malicious attackers can easily join and post misleading information, often with the intention of influencing the users’ decision in urban computing environments. To provide reliable information and improve the experience for...
متن کاملUnderstanding and Defending Against Malicious Identities in Online Social Networks
Understanding and Defending Against Malicious Identities in Online Social Networks
متن کاملIdentification of malicious nodes in an AODV pure ad hoc network through guard nodes
This paper presents a guard node based scheme to identify malicious nodes in Ad hoc on-Demand Vector (AODV) protocol. Each node calculates trust level of its neighboring nodes for route selection. Trust calculation process involves opinions of other nodes about the node whose trust level is to be determined. If a neighboring node has a trust level lower than predefined threshold value. it’s ide...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Emerging Trends in Engineering Research
سال: 2020
ISSN: 2347-3983
DOI: 10.30534/ijeter/2020/62842020