Filters








29 Hits in 8.3 sec

From past to present: Spam detection and identifying opinion leaders in social networks

Ayşe Berna ALTINEL GİRGİN
2022 Sigma Journal of Engineering and Natural Sciences  
As far as we know there is no survey that contains approaches for both spam detection and opinion leader identification in social networks.  ...  On microblogging sites, which are gaining more and more users every day, a wide range of ideas are quickly emerging, spreading, and creating interactive environments.  ...  Şeydanur and Soğukpınar (2020) conducted a study to detect malicious (phishing) emails using deep learning approaches [53] .  ... 
doi:10.14744/sigma.2022.00043 fatcat:56yfrjlxfzav7mnfgbfxpsxcyq

The Survey on Near Field Communication

Vedat Coskun, Busra Ozdenizci, Kerem Ok
2015 Sensors  
receivers [58] are other important issues for NFC system design.  ...  The authors of [27] focus on high-speed NFC transmissions based on Extended Binary Phase Shift Keying (EBPSK) modulation and they present its advantages over the existing NFC system.  ...  games. • Learning systems by NFC-based games.  ... 
doi:10.3390/s150613348 pmid:26057043 pmcid:PMC4507650 fatcat:ddxjqx2cebaopdxpg6jyctjsei

A Survey on Data-driven Software Vulnerability Assessment and Prioritization [article]

Triet H. M. Le, Huaming Chen, M. Ali Babar
2022 arXiv   pre-print
Our survey provides a taxonomy of the past research efforts and highlights the best practices for data-driven SV assessment and prioritization.  ...  We also discuss the current limitations and propose potential solutions to address such issues.  ...  ., phishing or malicious emails/URLs/IPs) to make informed security decisions [54, 152, 184] .  ... 
arXiv:2107.08364v4 fatcat:flbuoi7vszawrd57k6pbz7kvaa

Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches [article]

Triet H. M. Le
2022 arXiv   pre-print
The key contributions include a systematisation of knowledge, along with a suite of novel data-driven techniques and practical recommendations for researchers and practitioners in the area.  ...  The thesis results help improve the understanding and inform the practice of assessing ever-increasing vulnerabilities in real-world software systems.  ...  ., phishing or malicious emails/URLs/IPs) to make informed security decisions [39, 40, 41] .  ... 
arXiv:2207.11708v1 fatcat:q5nhlhboyfc2tipexhnqzmz77a

The Internet of Federated Things (IoFT): A Vision for the Future and In-depth Survey of Data-driven Approaches for Federated Learning [article]

Raed Kontar, Naichen Shi, Xubo Yue, Seokhyun Chung, Eunshin Byon, Mosharaf Chowdhury, Judy Jin, Wissam Kontar, Neda Masoud, Maher Noueihed, Chinedum E. Okwudire, Garvesh Raskutti (+3 others)
2021 arXiv   pre-print
This article provides a vision for IoFT and a systematic overview of current efforts towards realizing this vision.  ...  global model that maximizes utility across all IoT devices, (ii) a personalized model that borrows strengths across all devices yet retains its own model, (iii) a meta-learning model that quickly adapts  ...  Estimation of lead vehicle kinematics using systems, 27, 2014. camera-based data for driver distraction detection. In- [99] Google.  ... 
arXiv:2111.05326v1 fatcat:bbgdhtuqcrhstgakt2vxuve2ca

IRRODL Volume 13, Number 4

Various Authors
2012 International Review of Research in Open and Distance Learning  
In "Facebook Groups as LMS: A Case Study," Israeli authors look at the advantages and challenges of using the world's most popular social networking system for formal education.  ...  In "Footprints of Emergence" a team of UK authors tackles the thorny issue of emergence when interaction, content, and even learning outcomes may emerge within (or outside) a formal learning program.  ...  Wendy Nielsen, for her time and effort in editing. Acknowledgement The authors appreciatively acknowledge the financial support provided by a grant from  ... 
doi:10.19173/irrodl.v13i4.1392 fatcat:xochcjv4jrdmfoijbpigbm5kca

Testing a Model of Users' Web Risk Information Seeking Intention

Lixuan Zhang, Robert Pavur, Paul York, Clinton Amos
2013 Informing Science  
Abstract YouTube is a social media venue with great potential as a health education-informing channel.  ...  Health educators and the Centers for Disease Control and Prevention (CDC) (2011) recognize that YouTube enjoys a high level of engagement and comfort among young users.  ...  In summary, this study set out to provide a predictive model for post-adoption of social networking applications.  ... 
doi:10.28945/1761 fatcat:62fbqagwmbekrm67x7jgf2ighq

The People's Encyclopedia Under the Gaze of the Sages: A Systematic Review of Scholarly Research on Wikipedia

Chitu Okoli, Mohamad Mehdi, Mostafa Mesgari, Finn Årup Nielsen, Arto Lanamäki
2012 Social Science Research Network  
This article presents a systematic review of scholarly research on Wikipedia. We describe our detailed, rigorous methodology for identifying over 450 scholarly studies of Wikipedia.  ...  An appendix features an extensive list of resources useful for Wikipedia researchers.  ...  Rodríguez-Posada (emijrp) for his model WikiPapers site, upon which much of WikiLit was based.  ... 
doi:10.2139/ssrn.2021326 fatcat:egbnz5qzcjbfbnzxlz75x4ktz4

Towards Effective Research-Paper Recommender Systems and User Modeling based on Mind Maps [article]

Joeran Beel
2017 arXiv   pre-print
While user-modeling and recommender systems successfully utilize items like emails, news, and movies, they widely neglect mind-maps as a source for user modeling.  ...  Such systems could create additional value for millions of mind-mapping users.  ...  Users concerned about their privacy, might worry that when they click a recommendation, some unknown, and potentially malicious website, opens.  ... 
arXiv:1703.09109v1 fatcat:egcsnop34jbi7p2urz34pxr3vi

Associate Editors-in-Chief

2014 Acta Geologica Sinica (English)  
Acknowledgements This work was supported by the VENUS research cluster at the interdisciplinary Research Center for Information System Design (ITeG) at Kassel University and by the EU-project EveryAware  ...  We thank the SocioPatterns collaboration for providing privileged access to the SocioPatterns sensing platform.  ...  Because Mahout is a scalable machine learning library for big dataset, using the batch size of classification should have a better performance.  ... 
doi:10.1111/1755-6724.12260 fatcat:ffjz4kvnqnavzeipqzyladsyyu

Associate Editors-in-Chief [chapter]

2012 International Encyclopedia of Housing and Home  
Acknowledgements This work was supported by the VENUS research cluster at the interdisciplinary Research Center for Information System Design (ITeG) at Kassel University and by the EU-project EveryAware  ...  We thank the SocioPatterns collaboration for providing privileged access to the SocioPatterns sensing platform.  ...  Because Mahout is a scalable machine learning library for big dataset, using the batch size of classification should have a better performance.  ... 
doi:10.1016/b978-0-08-047163-1.09002-0 fatcat:t3rt56yjb5bwfnn5ttrcx3g2dy

Creepy or Cool? An Exploration of Non-Malicious Deepfakes Through Analysis of Two Case Studies

Keaunna Cleveland
2022
how ethical frameworks and practices from values-oriented design and value-based engineering in design may help guide creators as they develop deepfake technology videos and applications for non-malicious  ...  Several studies have examined the harms associated with the development of deepfake technology and its use by malicious actors, but less research has been devoted to deepfakes created by non-malicious  ...  et al., 2020; Pu et al., 2021; B.  ... 
doi:10.13016/nuis-3wkb fatcat:flmoy7iwrvcybayikbomzegsqa

Data Protection: Combining Fragmentation, Encryption, and Dispersion, a final report [article]

Gerard Memmi, Katarzyna Kapusta, Patrick Lambein, Han Qiu
2017 arXiv   pre-print
In this report, we first present a general and conceptual description of what should be a fragmentation, encryption, and dispersion system (FEDS) including a number of high level requirements such systems  ...  Then, we analyze works first on general dispersion systems in a bit wise manner without data structure consideration; second on fragmentation of information considering data defined along an object oriented  ...  Since in 2009, FHE based on ideal lattice is introduced by [Gentry 09a], three main branches of FHE schemes have been developed: lattice-based, integer-based and learning-with-errors (LWE) or ring-learning-witherrors  ... 
arXiv:1512.02951v2 fatcat:lowauzqyxrbnllx4hxcz5fkxp4

Research and Science Today 2(16)/2018

Adina MIHĂESCU, Ionuț Daniel MOLDOVAN, Alina-Monica BĂRĂIAN, Anca-Gabriela MICAŞ, Claudia Anamaria IOV, Marisia TOMA, Ștefania LEUCA, Gheorghe RADU, Horia Mircea BOTOŞ, Paul POPA, Iulia COMAN-CRISTEA, Sebastian MARIȘ (+23 others)
2018 Research and Science Today  
All authors report no potential conflict of interest. ACKNOWLEDGEMENTS All authors equally contributed in the research and drafting of this paper.  ...  It's network system was destroyed with a malicious software.  ...  this line of thought, any feedback from complex systems may not be detected for long periods of time, if ever.  ... 
doaj:22e7e62fac2f4fb09e9f92d60a81f645 fatcat:pn3nqplfzbdm7o3rtru4ipjnz4

Ideal spam nullification : understanding the impact of web spam [article]

Timothy Lee Jones, University, The Australian National, University, The Australian National
2018
However, elimination of all detected spam is not the optimum strategy for nullifying spam, as spam documents sometimes help users complete tasks.  ...  The results reported in this thesis suggest that the conventional use of independent document relevance as a gain value for [...]  ...  Acknowledgements The chief researcher for this study is Timothy Jones, a PhD student located in the Department of Computer Science at The Australian National University (email tim.iones(a)anu.edu.auV His  ... 
doi:10.25911/5d611b57f212a fatcat:mv6tovx2rvc4tn7jroy6vybb4u
« Previous Showing results 1 — 15 out of 29 results