نتایج جستجو برای: fake websites
تعداد نتایج: 20685 فیلتر نتایج به سال:
Online auction websites use a simple reputation system to help their users to evaluate the trustworthiness of sellers and buyers. However, to improve their reputation in the reputation system, fraudulent users can easily deceive the reputation system by creating fake transactions. This inflated-reputation fraud poses a major problem for online auction websites because it can lead legitimate use...
Phishing is an attempt by an individual or a group to get personal confidential information such as passwords, credit card information from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Fake websites which appear very similar to the original ones are being hosted to achieve this. In this paper we have proposed a new approach named as "Countering Phishi...
Phishing attacks exploit users’ inability to distinguish legitimate websites from fake ones. Strategies for combating phishing include the prevention and detection of phishing scams, tools to help users identify phishing websites, and training users not to fall for phish. While a great deal of effort has been devoted to the first two approaches, less research has been done in the area of traini...
lawgiver, for the purpose of penal supporting of national historical-cultural monuments, ratified repeated article 566 of islamic penal code in 1388; which demonstrates three actions of “making fake cases”, “introducing, carrying or storing” and “buying of historical-cultural monuments” as crimes. this criminalizing was necessary and advantageous, but the procedure of criminalizing has some wea...
Abstract: In the current scenario, data on web is growing to a larger extent. Social Media generating large amount of such as reviews, comments and customer’s opinions daily basis. This huge user generated worthless unless some miningt e c h n i q u s are applied it. Nowadays, there several people using social media reviews order anything through online. Online spam detection one herculean prob...
Social media can be a double-edged sword for modern communications, either a convenient channel exchanging ideas or an unexpected conduit circulating fake news through a large population. Existing studies of fake news focus on efforts on theoretical modelling of propagation or identification methods based on black-box machine learning, neglecting the possibility of identifying fake news using o...
A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the probabilistic encryption of some fake message. The method uses generation of two key streams with some secure block cipher. One of the key streams is generated depending on the secret key and the other one is generated depending on the fake key. The key streams are mixed wi...
Fake accounts on online social networks are increasing today with an increase in the number of active network users. Social media websites allow users to share thoughts, facts, views and re-sharing these into various networks. platforms provide enormous valuable information but this great amount media, many issues like fake profile, hacking have also grown. The profiles sites create news unwant...
P2P file sharing systems often use incentive policies to encourage sharing. With the decrease of free riders, the amount of cheating behaviors has increased. Some users rename a common file with a popular name to attract the downloads of other users in order to gain unfair advantages from incentive policies. We call the renamed file a fake file. While techniques have been proposed to combat fak...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید