Angebote zu "Detection" (48 Treffer)

Kategorien

Shops

Cyberbullying Detection in Twitter Using Machin...
39,90 € *
ggf. zzgl. Versand

Last few years the online social network has immensely popular in the whole world. Millions of users have used these sites as real-time communication, dynamic data sources where they can create their profiles and communicate with other users regardless of geographical location and physical limitations. In this region, these online social media have become vital and unique communication system. Online Social Media data can provide us with new innovative insights into the construction of social networks and societies, which is previously thought to be impossible regarding scale and extent. So, I am working on this issue. For cyberbullying detection using twitter data. I do my best. I am using little bit data set. In future i used huge amount of data from different sources.

Anbieter: Dodax
Stand: 29.01.2020
Zum Angebot
Analysis of Malicious Detection of Short URLs f...
39,90 € *
ggf. zzgl. Versand

Online Social Networks (OSNs) have become fundamental parts of our online lives, and their popularity is increasing at a surprising rate every day. Growing popularity of Twitter has attracted the attention of attackers who attempt to manipulate the features provided by Twitter to gain some advantage, such as driving Twitter users to other websites that they post as short URLs (Uniform Resource Locators) in their tweets.Even short URLs are also used to avoid sharing overly long URLs and save limited text space in tweets. Significant numbers of URLs shared in the OSNs are shortened URLs. Despite of its potential benefits from genuine usage, attackers use shortened URLs to hide the malicious URLs, which direct users to malicious pages. Although, OSN service providers and URL shortening services utilize certain detection mechanisms to prevent malicious URLs from being shortened, research has found that they fail to do so effectively.In this project, we developed mechanism to develop a machine learning classifier which detect malicious short URLs. And also shows comparative analysis of detection with various methods.

Anbieter: Dodax
Stand: 29.01.2020
Zum Angebot
Analysis of Malicious Detection of Short URLs f...
41,10 € *
ggf. zzgl. Versand

Online Social Networks (OSNs) have become fundamental parts of our online lives, and their popularity is increasing at a surprising rate every day. Growing popularity of Twitter has attracted the attention of attackers who attempt to manipulate the features provided by Twitter to gain some advantage, such as driving Twitter users to other websites that they post as short URLs (Uniform Resource Locators) in their tweets.Even short URLs are also used to avoid sharing overly long URLs and save limited text space in tweets. Significant numbers of URLs shared in the OSNs are shortened URLs. Despite of its potential benefits from genuine usage, attackers use shortened URLs to hide the malicious URLs, which direct users to malicious pages. Although, OSN service providers and URL shortening services utilize certain detection mechanisms to prevent malicious URLs from being shortened, research has found that they fail to do so effectively.In this project, we developed mechanism to develop a machine learning classifier which detect malicious short URLs. And also shows comparative analysis of detection with various methods.

Anbieter: Dodax AT
Stand: 29.01.2020
Zum Angebot
Social Network Analysis - Community Detection a...
120,99 € *
ggf. zzgl. Versand

This book is devoted to recent progress in social network analysis with a high focus on community detection and evolution. The eleven chapters cover the identification of cohesive groups, core components and key players either in static or dynamic networks of different kinds and levels of heterogeneity. Other important topics in social network analysis such as influential detection and maximization, information propagation, user behavior analysis, as well as network modeling and visualization are also presented. Many studies are validated through real social networks such as Twitter. This edited work will appeal to researchers, practitioners and students interested in the latest developments of social network analysis.

Anbieter: Dodax AT
Stand: 29.01.2020
Zum Angebot
Social Network Analysis - Community Detection a...
117,69 € *
ggf. zzgl. Versand

This book is devoted to recent progress in social network analysis with a high focus on community detection and evolution. The eleven chapters cover the identification of cohesive groups, core components and key players either in static or dynamic networks of different kinds and levels of heterogeneity. Other important topics in social network analysis such as influential detection and maximization, information propagation, user behavior analysis, as well as network modeling and visualization are also presented. Many studies are validated through real social networks such as Twitter. This edited work will appeal to researchers, practitioners and students interested in the latest developments of social network analysis.

Anbieter: Dodax
Stand: 29.01.2020
Zum Angebot
Robust system detector for identity clone attac...
37,00 € *
ggf. zzgl. Versand

We are living in the age of social networks, where folks are connected through social media. Examples of social media include Twitter, Facebook, LinkedIn and Myspace. Sometimes social media is not used in the intended way, which puts user data on security risks. This research thesis discusses a detection system for a special kind of security attack in which a fake user represents himself as a valid user and leaks other users' personal information. This kind of attack is known as Identity Clone Attack (ICA). We have introduced a novel technique of Clone Profiles Detection (CPD) that is a three steps approach which is based on similarity measure, IP address checking and behavioural model detection. This technique alerts a user and his friends in case of an identity clone attack and decreases the vulnerabilities of identity clone attack. Facebook graph APIs have been used for accessing Facebook users' profile for experimentation purposes. Experimental tests produced promising results.

Anbieter: Dodax AT
Stand: 29.01.2020
Zum Angebot
Robust system detector for identity clone attac...
35,90 € *
ggf. zzgl. Versand

We are living in the age of social networks, where folks are connected through social media. Examples of social media include Twitter, Facebook, LinkedIn and Myspace. Sometimes social media is not used in the intended way, which puts user data on security risks. This research thesis discusses a detection system for a special kind of security attack in which a fake user represents himself as a valid user and leaks other users' personal information. This kind of attack is known as Identity Clone Attack (ICA). We have introduced a novel technique of Clone Profiles Detection (CPD) that is a three steps approach which is based on similarity measure, IP address checking and behavioural model detection. This technique alerts a user and his friends in case of an identity clone attack and decreases the vulnerabilities of identity clone attack. Facebook graph APIs have been used for accessing Facebook users' profile for experimentation purposes. Experimental tests produced promising results.

Anbieter: Dodax
Stand: 29.01.2020
Zum Angebot
Identifying Terrorist Affiliations through Soci...
49,90 € *
ggf. zzgl. Versand

In a world in which, since the fall of Twin Towers in New York on 9/11/2001, local ideologically inspired warfare becomes global all too quickly, terrorist groups like Al Quaeda and ISIS (Daesh) have successfully used modern computing technology and social networking environments to disperse their message, recruit new members, and plot attacks. This is especially true for such platforms as Twitter and encrypted mobile apps like Telegram or the clandestine Alrawi. As early detection of such activity is crucial to attack prevention data mining techniques have become increasingly important in the fight against the spread of global terrorist activity.This study employs data mining tools to mine Twitter for terrorist 'organizing' vocabulary and to pinpoint, through the analysis of (admittedly spares) tweet metadata, the most likely geographical location and connected identities behind the user accounts from which organizing or post-event information is disseminated.

Anbieter: Dodax
Stand: 29.01.2020
Zum Angebot
Identifying Terrorist Affiliations through Soci...
51,30 € *
ggf. zzgl. Versand

In a world in which, since the fall of Twin Towers in New York on 9/11/2001, local ideologically inspired warfare becomes global all too quickly, terrorist groups like Al Quaeda and ISIS (Daesh) have successfully used modern computing technology and social networking environments to disperse their message, recruit new members, and plot attacks. This is especially true for such platforms as Twitter and encrypted mobile apps like Telegram or the clandestine Alrawi. As early detection of such activity is crucial to attack prevention data mining techniques have become increasingly important in the fight against the spread of global terrorist activity.This study employs data mining tools to mine Twitter for terrorist 'organizing' vocabulary and to pinpoint, through the analysis of (admittedly spares) tweet metadata, the most likely geographical location and connected identities behind the user accounts from which organizing or post-event information is disseminated.

Anbieter: Dodax AT
Stand: 29.01.2020
Zum Angebot