A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Opportunistic mobile social networks: architecture, privacy, security issues and future directions
2019
International Journal of Electrical and Computer Engineering (IJECE)
The main contribution of this paper is regarding privacy and security issues in Opportunistic Mobile Social Networks. ...
Finally, some future research directions in Opportunistic Mobile Social Networks have been elaborated regarding the data's privacy and security. ...
PRIVACY AND SECURITY ISSUES IN OPPORTUNISTIC MSN The privacy and security issues in opportunistic networking are discussed in detail in [5] . ...
doi:10.11591/ijece.v9i2.pp1145-1152
fatcat:krsz436h3bfijf7enohj5dyvwm
Twitter in disaster mode
2011
Proceedings of the Special Workshop on Internet and Disasters - SWID '11
In this paper, we present Twimight and its network security extensions. ...
In such situations, the phones' capabilities of infrastructure-less communication can fill in: By propagating data opportunistically (from phone to phone), tweets can still be spread, yet at the cost of ...
simple anti-spam scheme avoiding misbehaving users to flood the network with less important tweets. ...
doi:10.1145/2079360.2079367
fatcat:efrwmhdbxregtm2xb2nvjhcqwq
A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks
2012
Security and Communication Networks
In this paper, we focus on a SPAM flooding attack, namely SMTP SPAM, and demonstrate, through simulations and discussion, its DoS impact on the Long Term Evolution (LTE) network and subsequent effects ...
The 4G of mobile networks will be a technology-opportunistic and user-centric system, combining the economical and technological advantages of various transmission technologies. ...
For future work, we plan to work on collaborative preventive approaches against SPAM flooding in LTE networks. Figure 1 . 1 Broadband
Figure 3 . 3 LTE EPC [24] . ...
doi:10.1002/sec.413
fatcat:amjwtdxkqvgcjpfxf3nv7ni3fq
Editorial: Fourth Quarter 2015 IEEE Communications Surveys and Tutorials
2015
IEEE Communications Surveys and Tutorials
Anonymity networks prevent traffic analysis and network surveillance, or at least make it more difficult. ...
The paper titled "A Survey on Opportunistic Routing in Wireless Communication Networks" by Nessrine Chakchouk presents a comprehensive survey of the existing literature related to opportunistic routing ...
doi:10.1109/comst.2015.2495008
fatcat:n3pvj2nvm5hxncj5oxqcd7cbvy
Improving Organizational Information Security Strategy via Meso-Level Application of Situational Crime Prevention to the Risk Management Process
2010
Communications of the Association for Information Systems
., -zombies‖) in the furtherance of other goals (e.g., establishing communication networks and launching distributed attacks). ...
Perceived Threats (Step 2a): ITforYou, Inc. perceives two primary threats-the opportunist seeking a target of opportunity and the anti-spam hacktivist receiving what they believe is spam from ITforYou, ...
ACKNOWLEDGEMENTS Srinivasan Rao's participation in this research was supported in part by a grant from the College of Business at UTSA. ...
doi:10.17705/1cais.02617
fatcat:jgadnevq4ze4ncxwlb4rahcczu
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications
2014
2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)
We investigate the TrustMeters performance under different attacks by means of extensive simulations, and show that it succeeds in quarantining malicious users in most analyzed scenarios. ...
Users can mutually preserve their privacy by opportunistically exchanging sensor readings during physical meetings, thus breaking the link between the collected data and their permanent identities. ...
Therefore, we focus on solutions tailored to delay tolerant and opportunistic networks [11] sharing the more similarities with our system model (see Sec. II-A). ...
doi:10.1109/issnip.2014.6827614
dblp:conf/issnip/ChristinPHK14
fatcat:63octulrfraabghdmja627sfla
Video interactions in online video social networks
2009
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
In addition to providing valuable statistical models for various characteristics, our study uncovers typical user behavioral patterns in video-based environments and shows evidence of opportunistic behavior ...
Based on crawled data covering a representative subset of videos and users, we present a characterization from two perspectives: the video response view and the interaction network view. ...
-Evidence of opportunistic behavior in online video social networks. Our study unveils evidence of two types of opportunistic behavior by YouTube users, namely promotion and video spamming. ...
doi:10.1145/1596990.1596994
fatcat:hjjjujdjkra4bcclkmvggfbflq
PIF: A Personalized Fine-Grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks
2015
IEEE Transactions on Computational Social Systems
Mobile social network (MSN) emerges as a promising social network paradigm that enables mobile users' information sharing in the proximity and facilitates their cyber-physical-social interactions. ...
As the advertisements, rumors, and spams spread in MSNs, it is necessary to filter spams before they arrive at the recipients to make the MSN energy efficient. ...
Social network, i.e., the social graph formed by users in the network, is another helpful methodology to detect and filter spams. Lahmadi et al. ...
doi:10.1109/tcss.2016.2519819
fatcat:tu3z53chyrcu7d5va3neduktaa
Overview of Challenges in Securing a Cognitive Radio Network
2016
International Journal of Engineering Research and
Cognitive Radio Network (CRN) is a promising wireless network where smart devices are able to opportunistically exploit the spectrum holes and optimize the overall radio spectrum use. ...
Secure communication is the key of success for any wireless network. As cognitive radio networks are wireless in nature, they face all classic threats present in the conventional wireless networks. ...
DOS ATTACKS IN COGNITIVE RADIO NETWORKS A denial of service is characterized by an explicit attempt by an attacker to prevent legitimate users from gaining access to the desired network resources. ...
doi:10.17577/ijertv5is010327
fatcat:bzt53jhe2ndztnk4xhuiiiyvrq
Mobile Social Networks: Architecture, Privacy, Security Issues and Solutions
2017
Journal of Communications
Statistical surveys show that almost 80% of people are involved in such kind of networking. This paper gives an overview of recent related works contributed in Mobile social networks. ...
-Mobile social networks are applications or platforms that allow mobile users to communicate or interact with each other. ...
This type of communication layout is seen in opportunistic network, ad-hoc network or delay tolerant network. Proximity marketing [6] is an example in which this kind of structural layout is seen. ...
doi:10.12720/jcm.12.9.524-531.
fatcat:suttgxkaxfcmlo5zgisqhszh6m
Variants of Ransomware Assaults and Prevention Strategies
2020
International Journal of Engineering and Advanced Technology
Here in this paper we focus on types of ransomware its detection and prevention of different types of ransomware attacks ...
In current days various types of Ransomware categorized as crypto ransomware and locker ransomware which prevents user from accessing their system, either by locking the system's screen or block access ...
Often, using best practices from email security and spam filtering to prevent unwanted attachments from appearing in mail box. ...
doi:10.35940/ijeat.d6843.049420
fatcat:nvcfahvtdzhotkkvl4fudlbwla
Detection of Video Spam In Social Network Based Neural Network Convolution
2019
International Journal of Advanced Trends in Computer Science and Engineering
In this article, we have proposed a new approach to limit the dissemination and dissemination of spam videos on social networks, both when they are downloaded as an opening publication and when they are ...
Since using online social networking services, users trust that they will be protected against all types of malicious content, including spam videos, which could compromise patient and user satisfaction ...
The problem of detecting these spam videos consists in the possibility of preventing a video V_i from being a spam video using a classifier, C : U_i → {Spam video, legitimate video} (1) These spam videos ...
doi:10.30534/ijatcse/2019/53842019
fatcat:rbjq57s6pfcj5pdoexrfeojsny
Connected Consumption: The Hidden Networks of Consumption
2009
2009 6th IEEE Consumer Communications and Networking Conference
It can also help people connect opportunistically in a local area to make group purchases, to pick up an item for a friend, and to perform reverse auctions. ...
networked consumers. ...
to thank Bill Wagner and Jeff Carter for their support; to Sandy Pentland for research guidance; to Ray Garcia and Erik Ross for intensive discussions on various points of the project; to Michael King in ...
doi:10.1109/ccnc.2009.4784721
dblp:conf/ccnc/LeeSLRS10
fatcat:yrkd2q7u35ex3dvcm5l4oeiuyi
An Evaluation of Routing Reliability in Non-collaborative Opportunistic Networks
2009
2009 International Conference on Advanced Information Networking and Applications
An opportunistic network is a type of challenged network that has attracted a great deal of attention in recent years. ...
In this study, we identify five types of non-collaborative behavior, namely free rider, black hole, supernova, hypernova, and wormhole behavior, in opportunistic networks. ...
; in other words, it is similar to email spamming, network worms, and denial of service attacks on the Internet. ...
doi:10.1109/aina.2009.54
dblp:conf/aina/ChenCC09
fatcat:vaesfy2bbzcpfpumnnzhhzk7a4
Identifying video spammers in online social networks
2008
Proceedings of the 4th international workshop on Adversarial information retrieval on the web - AIRWeb '08
In many video social networks, including YouTube, users are permitted to post video responses to other users' videos. ...
We then show that our approach succeeds at detecting much of the spam while only falsely classifying a small percentage of the legitimate videos as spam. ...
Marcos Gonçalves (Federal University of Minas Gerais -Brazil) for his valuable suggestions in Section 5. ...
doi:10.1145/1451983.1451996
dblp:conf/airweb/BenevenutoRAAZR08
fatcat:tn7kfex6k5hs7mutedcpqvkzeq
« Previous
Showing results 1 — 15 out of 829 results