243 Hits in 5.2 sec

An NLP Based Contrivance to Simplify Customer Interaction

Consertle would be one of the first banking applications in India that enables users to interact with an intelligent application through a chat bot that is specifically designed to understand, interpret  ...  While chat bots itself are a new introduction to the Indian financial system, an intelligent chat bot enables customer to instant and more efficient query resolution.Currently, most banking applications  ...  In the following paper" Autonomic Author Identification in Internet Relay Chat (IRC) " by Sicong Shao [3] , the Internet Relay Chat (IRC) channels are generally used to transfer messages and data  ... 
doi:10.35940/ijitee.b7229.019320 fatcat:ldkpejs7m5dfph5asoh2gucgl4

Survey on Interactive Chatbot

Mrs. R. Dharaniya
2020 International Journal for Research in Applied Science and Engineering Technology  
In recent days chatbots are designed based on how human beings communicate with the systems. A chat interface helps the user communicate with the chatbot as if it is a real person.  ...  The keywords in the query are matched with the information that is stored in the database and the reply is sent to the user.NLP and Keyword matching is used to improve the overall working of the system  ...  In Autonomic Author Identification in Internet Relay Chat (IRC), the authors Sicong Shao, Cihan Tunc, Amany Al-Shawi, Salim Hariri have presented an autonomic author identification technique based on personality  ... 
doi:10.22214/ijraset.2020.6277 fatcat:qbsry4t6pjhorjyrvwe6tnknpa

Usage of Virtual Communication in University Environment

H. Tomášková, Z. Němcová, M. Šimková
2011 Procedia - Social and Behavioral Sciences  
That is the reason, why the Czech Science Foundation project #402/09/0662 Decision systems in autonomous systems emerged.  ...  Virtual communication is impersonal communication through mobile devices and internet.  ...  Protocol Support: AIM (AOL Instant Messenger), Facebook , Gadu-Gadu, IAX (Inter-Asterisk Exchange), ICQ, IRC (Internet Relay Chat), Jabber, MSN, Netsend, Tlen, Yahoo, and more.  ... 
doi:10.1016/j.sbspro.2011.11.068 fatcat:r2v4uyo54bakxpzxbva6topade

Users as Co-Designers of Software-Based Media: The Co-Construction of Internet Relay Chat

Guillaume Latzko-Toth
2014 Canadian Journal of Communication  
The case of Internet Relay Chat (IRC) shows that users can be fully involved in the design process, a co-construction in the sense of Science and Technology Studies (STS): a collective, simultaneous, and  ...  While it has become commonplace to present users as co-creators or "produsers" of digital media, their participation is generally considered in terms of content production.  ...  Internet Relay Chat and its actants before turning our attention to the case at hand, it is necessary to introduce the terminology of Internet relay chat (Irc) and some of its basic concepts.  ... 
doi:10.22230/cjc.2014v39n4a2783 fatcat:hrtpny2rwbdqpgzm5e2yjnrroi

ChatTrack: Chat Room Topic Detection Using Classification [chapter]

Jason Bengel, Susan Gauch, Eera Mittur, Rajan Vijayaraghavan
2004 Lecture Notes in Computer Science  
The traditional analysis of Internet chat room discussions places a resource burden on the intelligence community because of the time required to monitor thousands of continuous chat sessions.  ...  Given the upsurge of interest in homeland security issues, we have developed a text classification system that creates a concept-based profile that represents a summary of the topics discussed in a chat  ...  Introduction One rapidly growing type of communication on the Internet is Instant Messaging (IM) and Internet Relay Chat (IRC).  ... 
doi:10.1007/978-3-540-25952-7_20 fatcat:ks67tn54a5e63dj3p32crdh6dq

The economy of phishing: A survey of the operations of the phishing market

Christopher Abad
2005 First Monday  
The result is detailed analysis from 3,900,000 phishing e-mails, 220,000 messages collected from 13 key phishing-related chat rooms, 13,000 chat rooms and 48,000 users, which were spidered across six chat  ...  networks and 4,400 compromised hosts used in botnets.  ...  Their main role in internet chat is to form a mercenary authority infrastructure in otherwise unregulated chat rooms.  ... 
doi:10.5210/fm.v10i9.1272 fatcat:mumwakl37vhwdnxecr7uo77kma

TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication [article]

Ralph Holz and Johanna Amann and Olivier Mehani and Matthias Wachs and Mohamed Ali Kaafar
2015 arXiv   pre-print
Thanks to the use of standardised protocols electronic mail (SMTP, IMAP, POP3) and instant chat (XMPP, IRC) servers can be deployed in a decentralised but interoperable fashion.  ...  Our findings shed light on an insofar unexplored area of the Internet. The truly frightening result is that most of our communication is poorly secured in transit.  ...  Internet Relay Chat (IRC) [30] is a protocol allowing a number of clients connecting to an IRC server to join chat rooms or exchange private conversations.  ... 
arXiv:1511.00341v1 fatcat:lu3c7dh3ffdvbmyqyr2lahbqve

The Analysis and Identification of P2P Botnet's Traffic Flows

Wernhuar Tarng, Li-Zhong Deng, Kuo-Liang Ou, Mingteh Chen
2011 International Journal of Communication Networks and Information Security  
As the advance of information and communication technologies, the Internet has become an integral part of human life.  ...  The infected computers will become the zombie computers in the botnets controlled by hackers. Thus, it is an important subject regarding network security to detect and defend against the botnets.  ...  The first botnet appeared in 1993 in the Internet Relay Chat (IRC) networks, and became wide-spreading after 1999.  ... 
dblp:journals/ijcnis/TarngDOC11 fatcat:wqamwellovgb3pvihb373exphu

Botnets as an Instrument of Warfare [chapter]

Eric Koziel, David Robinson
2011 IFIP Advances in Information and Communication Technology  
The use of botnets for malicious activities has grown significantly in recent years.  ...  These same attributes readily translate to applications that can support operations in warfare.  ...  While various mechanisms exist, the two main types of command and control channels are peer-to-peer (P2P) protocols and Internet Relay Chat (IRC).  ... 
doi:10.1007/978-3-642-24864-1_2 fatcat:kpnvq77l5nahdlccr4iqceu2vm

The State of the Art of Spam and Anti-Spam Strategies and a Possible Solution using Digital Forensics

Franscois Van Staden, Hein S. Venter
2009 Information Security for South Africa  
The paper looks at honeypots as part of information gathering in a digital forensic process. Digital forensic science has been employed to authenticate email authors and back trace email paths.  ...  Electronic communication such as email is an efficient and cost effective communication medium in today's connected world.  ...  The Trojans in a botnet used IRC (internet Relay Chat) connections to receive information from the controler.  ... 
dblp:conf/issa/StadenV09 fatcat:mrltbor7hjdd3lprgsq6vbbh6e

Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions

M. H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya, J. K. Kalita
2013 Computer journal  
In this paper, we present a comprehensive survey of DDoS attacks, detection methods and tools used in wired networks.  ...  Due to the continuous evolution of new attacks and ever-increasing number of vulnerable hosts on the Internet, many DDoS attack detection or prevention mechanisms have been proposed.  ...  The authors are thankful to the funding agencies.  ... 
doi:10.1093/comjnl/bxt031 fatcat:524xbef42jeolah3fisoayvf3y

Machine Learning-Based Botnet Detection in Software-Defined Network: A Systematic Review

Khlood Shinan, Khalid Alsubhi, Ahmed Alzahrani, Muhammad Usman Ashraf
2021 Symmetry  
In recent decades, the internet has grown and changed the world tremendously, and this, in turn, has brought about many cyberattacks.  ...  We evaluated various articles published since 2006 in the field of botnet detection, based on machine learning, and from 2015 in the field of SDN.  ...  Therefore, the authors gratefully acknowledge the DSR for technical and financial support. Conflicts of Interest: The authors declare no conflict of interest. Symmetry 2021, 13, 866  ... 
doi:10.3390/sym13050866 fatcat:fw7k3xxwdvdb3fa2ch6hvbywwe

Designing Deliberative Democracy in Cyberspace: The Role of the Cyber-Lawyer

Beth Simone Noveck
2003 Social Science Research Network  
of the communication capabilities offered by Internet Relay Chat ("IRC"), see Elizabeth M.  ...  Commercial chat applications, such as iChat, TalkCity or ParaChat, are based on Internet Relay Chat ("IRC"), the original chat technology, created in 1988 by Jarkko Oikarinen, a Finnish network administrator  ...  Other applications, such as Palace, a graphical form of Internet Relay Chat, represent participants with cartoonlike characters or so-called avatars. 363 This gives each group member a unique but highly  ... 
doi:10.2139/ssrn.432120 fatcat:xcitdm2ri5eqbg2xqdzdmg2vhu

Protecting Web 2.0 Services from Botnet Exploitations

Nguyen H. Vo, Josef Pieprzyk
2010 2010 Second Cybercrime and Trustworthy Computing Workshop  
IP Internet Protocol. Network layer protocol which speci es the format of packets. IRC Internet Relay Chat. A special protocol for real-time chat.  ...  Internet Relay Chat (IRC), invented in 1988 by Jarkko Oikarinen, provided an opportunity for group (many-to-many) communication in real time.  ... 
doi:10.1109/ctc.2010.10 fatcat:cfoopseg4vc3lf7sfd2twrmfoy

Psychology and the Internet: A Social Ecological Analysis

Maria Montero, Daniel Stokols
2003 CyberPsychology & Behavior  
Finally, the last section describes the scope and limitations of this perspective, and discusses its heuristic utility for the development and consolidation of a new area in psychological research: "digital  ...  Finally, the last section describes the scope and limitations of this perspective, and discusses its heuristic utility for the development and consolidation of a new area in psychological research: "digital  ...  , newsgroups, and Internet relay chat (IRC).  ... 
doi:10.1089/109493103321167974 pmid:12650564 fatcat:3wzcfwyn2jh2fbmh3r3chhnohi
« Previous Showing results 1 — 15 out of 243 results