A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
From past to present: Spam detection and identifying opinion leaders in social networks
2022
Sigma Journal of Engineering and Natural Sciences
As far as we know there is no survey that contains approaches for both spam detection and opinion leader identification in social networks. ...
On microblogging sites, which are gaining more and more users every day, a wide range of ideas are quickly emerging, spreading, and creating interactive environments. ...
Şeydanur and Soğukpınar (2020) conducted a study to detect malicious (phishing) emails using deep learning approaches [53] . ...
doi:10.14744/sigma.2022.00043
fatcat:56yfrjlxfzav7mnfgbfxpsxcyq
The Survey on Near Field Communication
2015
Sensors
receivers [58] are other important issues for NFC system design. ...
The authors of [27] focus on high-speed NFC transmissions based on Extended Binary Phase Shift Keying (EBPSK) modulation and they present its advantages over the existing NFC system. ...
games. • Learning systems by NFC-based games. ...
doi:10.3390/s150613348
pmid:26057043
pmcid:PMC4507650
fatcat:ddxjqx2cebaopdxpg6jyctjsei
A Survey on Data-driven Software Vulnerability Assessment and Prioritization
[article]
2022
arXiv
pre-print
Our survey provides a taxonomy of the past research efforts and highlights the best practices for data-driven SV assessment and prioritization. ...
We also discuss the current limitations and propose potential solutions to address such issues. ...
., phishing or malicious emails/URLs/IPs) to make informed security decisions [54, 152, 184] . ...
arXiv:2107.08364v4
fatcat:flbuoi7vszawrd57k6pbz7kvaa
Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches
[article]
2022
arXiv
pre-print
The key contributions include a systematisation of knowledge, along with a suite of novel data-driven techniques and practical recommendations for researchers and practitioners in the area. ...
The thesis results help improve the understanding and inform the practice of assessing ever-increasing vulnerabilities in real-world software systems. ...
., phishing or malicious emails/URLs/IPs) to make informed security decisions [39, 40, 41] . ...
arXiv:2207.11708v1
fatcat:q5nhlhboyfc2tipexhnqzmz77a
The Internet of Federated Things (IoFT): A Vision for the Future and In-depth Survey of Data-driven Approaches for Federated Learning
[article]
2021
arXiv
pre-print
This article provides a vision for IoFT and a systematic overview of current efforts towards realizing this vision. ...
global model that maximizes utility across all IoT devices, (ii) a personalized model that borrows strengths across all devices yet retains its own model, (iii) a meta-learning model that quickly adapts ...
Estimation of lead vehicle kinematics using systems, 27, 2014.
camera-based data for driver distraction detection. In- [99] Google. ...
arXiv:2111.05326v1
fatcat:bbgdhtuqcrhstgakt2vxuve2ca
IRRODL Volume 13, Number 4
2012
International Review of Research in Open and Distance Learning
In "Facebook Groups as LMS: A Case Study," Israeli authors look at the advantages and challenges of using the world's most popular social networking system for formal education. ...
In "Footprints of Emergence" a team of UK authors tackles the thorny issue of emergence when interaction, content, and even learning outcomes may emerge within (or outside) a formal learning program. ...
Wendy Nielsen, for her time and effort in editing.
Acknowledgement The authors appreciatively acknowledge the financial support provided by a grant from ...
doi:10.19173/irrodl.v13i4.1392
fatcat:xochcjv4jrdmfoijbpigbm5kca
Testing a Model of Users' Web Risk Information Seeking Intention
2013
Informing Science
Abstract YouTube is a social media venue with great potential as a health education-informing channel. ...
Health educators and the Centers for Disease Control and Prevention (CDC) (2011) recognize that YouTube enjoys a high level of engagement and comfort among young users. ...
In summary, this study set out to provide a predictive model for post-adoption of social networking applications. ...
doi:10.28945/1761
fatcat:62fbqagwmbekrm67x7jgf2ighq
The People's Encyclopedia Under the Gaze of the Sages: A Systematic Review of Scholarly Research on Wikipedia
2012
Social Science Research Network
This article presents a systematic review of scholarly research on Wikipedia. We describe our detailed, rigorous methodology for identifying over 450 scholarly studies of Wikipedia. ...
An appendix features an extensive list of resources useful for Wikipedia researchers. ...
Rodríguez-Posada (emijrp) for his model WikiPapers site, upon which much of WikiLit was based. ...
doi:10.2139/ssrn.2021326
fatcat:egbnz5qzcjbfbnzxlz75x4ktz4
Towards Effective Research-Paper Recommender Systems and User Modeling based on Mind Maps
[article]
2017
arXiv
pre-print
While user-modeling and recommender systems successfully utilize items like emails, news, and movies, they widely neglect mind-maps as a source for user modeling. ...
Such systems could create additional value for millions of mind-mapping users. ...
Users concerned about their privacy, might worry that when they click a recommendation, some unknown, and potentially malicious website, opens. ...
arXiv:1703.09109v1
fatcat:egcsnop34jbi7p2urz34pxr3vi
Associate Editors-in-Chief
2014
Acta Geologica Sinica (English)
Acknowledgements This work was supported by the VENUS research cluster at the interdisciplinary Research Center for Information System Design (ITeG) at Kassel University and by the EU-project EveryAware ...
We thank the SocioPatterns collaboration for providing privileged access to the SocioPatterns sensing platform. ...
Because Mahout is a scalable machine learning library for big dataset, using the batch size of classification should have a better performance. ...
doi:10.1111/1755-6724.12260
fatcat:ffjz4kvnqnavzeipqzyladsyyu
Associate Editors-in-Chief
[chapter]
2012
International Encyclopedia of Housing and Home
Acknowledgements This work was supported by the VENUS research cluster at the interdisciplinary Research Center for Information System Design (ITeG) at Kassel University and by the EU-project EveryAware ...
We thank the SocioPatterns collaboration for providing privileged access to the SocioPatterns sensing platform. ...
Because Mahout is a scalable machine learning library for big dataset, using the batch size of classification should have a better performance. ...
doi:10.1016/b978-0-08-047163-1.09002-0
fatcat:t3rt56yjb5bwfnn5ttrcx3g2dy
Creepy or Cool? An Exploration of Non-Malicious Deepfakes Through Analysis of Two Case Studies
2022
how ethical frameworks and practices from values-oriented design and value-based engineering in design may help guide creators as they develop deepfake technology videos and applications for non-malicious ...
Several studies have examined the harms associated with the development of deepfake technology and its use by malicious actors, but less research has been devoted to deepfakes created by non-malicious ...
et al., 2020; Pu et al., 2021; B. ...
doi:10.13016/nuis-3wkb
fatcat:flmoy7iwrvcybayikbomzegsqa
Data Protection: Combining Fragmentation, Encryption, and Dispersion, a final report
[article]
2017
arXiv
pre-print
In this report, we first present a general and conceptual description of what should be a fragmentation, encryption, and dispersion system (FEDS) including a number of high level requirements such systems ...
Then, we analyze works first on general dispersion systems in a bit wise manner without data structure consideration; second on fragmentation of information considering data defined along an object oriented ...
Since in 2009, FHE based on ideal lattice is introduced by [Gentry 09a], three main branches of FHE schemes have been developed: lattice-based, integer-based and learning-with-errors (LWE) or ring-learning-witherrors ...
arXiv:1512.02951v2
fatcat:lowauzqyxrbnllx4hxcz5fkxp4
Research and Science Today 2(16)/2018
2018
Research and Science Today
All authors report no potential conflict of interest.
ACKNOWLEDGEMENTS All authors equally contributed in the research and drafting of this paper. ...
It's network system was destroyed with a malicious software. ...
this line of thought, any feedback from complex systems may not be detected for long periods of time, if ever. ...
doaj:22e7e62fac2f4fb09e9f92d60a81f645
fatcat:pn3nqplfzbdm7o3rtru4ipjnz4
Ideal spam nullification : understanding the impact of web spam
[article]
2018
However, elimination of all detected spam is not the optimum strategy for nullifying spam, as spam documents sometimes help users complete tasks. ...
The results reported in this thesis suggest that the conventional use of independent document relevance as a gain value for [...] ...
Acknowledgements The chief researcher for this study is Timothy Jones, a PhD student located in the Department of Computer Science at The Australian National University (email tim.iones(a)anu.edu.auV His ...
doi:10.25911/5d611b57f212a
fatcat:mv6tovx2rvc4tn7jroy6vybb4u
« Previous
Showing results 1 — 15 out of 29 results