A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
The SCAM Approach to Copy Detection in Digital Libraries
1995
D-Lib Magazine
Funding for this cooperative agreement is also provided by ARPA, NASA, and the industrial partners of the Stanford Digital Libraries Project. . ...
MDA972-92-J-1029 with the Corporation for National Research Initiatives (CNRI). The research is also partially supported by the National Science Foundation under Cooperative Agreement IRI-9411306. ...
In Architecture of SCAM (below), we present the underlying registration mechanism of SCAM that could be used as a "plug-in" module for copy detection in a system such as SIFT. ...
doi:10.1045/november95-shivakumar
fatcat:kd2ynerasndypcglmbuhnbydjm
Cryptocurrency scams: analysis and perspectives
2021
IEEE Access
However, doing research in this field requires addressing several challenges: for instance, although a few data sources about cryptocurrency scams are publicly available, they often contain incomplete ...
Indeed, the unavailability of reliable datasets makes it difficult to train effective automatic classifiers that can detect and analyse cryptocurrency scams. ...
For these reasons, we crawl Web Archive, a digital archive of the World Wide Web, also containing snapshots (i.e., archived copies) of now offline sites. ...
doi:10.1109/access.2021.3123894
fatcat:k3zt6cww2vc2nbx2xtgffyok7y
Creative Accounting Scam at Satyam Computer Limited: How the Fraud Story Unfolded?
2016
Open Journal of Accounting
An attempt has been made to provide an explanation for various "intriguing" questions about Satyam scam, such as: What was the need to commit a fraud on such a large scale? ...
What was Raju's real modus-operandi to manipulate the accounts for eight years? Why was Raju forced to blow his own whistle? ...
Several commentators criticized PwC harshly for failing to detect the fraud [32]. ...
doi:10.4236/ojacct.2016.54007
fatcat:sjwv2gafzbgrpo3xwc2mgd6ffe
Security Smells in Android
2017
2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM)
However, each study has often dealt with a specific issue, making the results less actionable for practitioners. ...
Moreover, we develop a lightweight static analysis tool and discuss the extent to which it successfully detects several vulnerabilities in about 46,000 apps hosted by the official Android market. ...
Mitigation: Use libraries that provide strong documentation and working code examples, and rely on simplified APIs with secure defaults [2] . • Unpinned Certificate Digital certificates are needed to ...
doi:10.1109/scam.2017.24
dblp:conf/scam/GhafariGN17
fatcat:jp7ru6x4xzcjhm33w2bebl6vs4
A Plagiarism Detection System for Malayalam Text Based Documents with Full and Partial Copy
2016
Procedia Technology - Elsevier
In this paper, a technique for detecting full and partial copies is proposed. ...
Many document copy detection systems have been proposed ,but an efficient detection system for Malayalam documents is not available. ...
In this paper , a method for copy detection where copy of part of a document or the entire document can be detected was discussed. ...
doi:10.1016/j.protcy.2016.08.120
fatcat:vkrg4ifvs5fnzdelel7bi7ufoi
Document overlap detection system for distributed digital libraries
2000
Proceedings of the fifth ACM conference on Digital libraries - DL '00
The matching-engine component uses a modified suffix tree representation, which is able to identify the exact overlapping chunks and its performance is also presented. ...
In this paper we introduce the MatchDetectReveal(MDR) system, which is capable of identifying overlapping and plagiarised documents. Each component of the system is briefly described. ...
Copy-detection mechanisms may be used as a filter on search results, which excludes documents that overlap with documents above a certain threshold. ...
doi:10.1145/336597.336667
dblp:conf/dl/MonostoriZS00
fatcat:k55xyj7qwbgfzc4jqhw5k6ijd4
Parallel and Distributed Document Overlap Detection on the Web
[chapter]
2001
Lecture Notes in Computer Science
Documents are easily copied and redistributed or used to create plagiarised assignments and conference papers. This paper presents a new, two-stage approach for identifying overlapping documents. ...
Proliferation of digital libraries plus availability of electronic documents from the Internet have created new challenges for computer science researchers and professionals. ...
Acknowledgment Support from Distributed Systems Technology Centre (DSTC Pty Ltd) for this project is thankfully acknowledged. ...
doi:10.1007/3-540-70734-4_25
fatcat:ld2waogdknesjfa4542fm5c4kq
Survey of Text Plagiarism Detection
2012
Computer Engineering and Applications Journal
It was found that many of the proposed methods for plagiarism detection have a weakness and lacking for detecting some types of plagiarized text. ...
This paper discussed several important issues in plagiarism detection such as; plagiarism detection Tasks, plagiarism detection process and some of the current plagiarism detection techniques.DOI: 10.18495 ...
The authors would like to thank International University of Africa (IUA) and Research Management Centre (RMC) Universiti Teknologi Malaysia for the support and incentive extended in making this study a ...
doi:10.18495/comengapp.v1i1.5
fatcat:xyvk24mevvhgpokhyn3bgo64ge
SISTEM DETEKSI DINI PLAGIARISME TUGAS AKHIR MAHASISWA MENGGUNAKAN ALGORITMA NGRAMS DAN WINNOWING
2016
Jurnal Ilmiah Flash
Based on experiments, the result is indicated that the method can be used as an early warning system for plagiarism detection. ...
It became more complicated when the resources used were taken from a different language with a suspicious document. ...
Oleh karena itu, penulis menggagas untuk dibangunnya sebuah sistem deteksi plagiat (Plagiarism detection system) yang menggunakan SCAM (Stanford Copy Analysis Mechanism). ...
doi:10.32511/jiflash.v2i1.19
fatcat:ucirpbwrt5bphc3uifrtrf2omm
The Programmer's Lexicon, Volume I: The Verbs
2007
Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)
Our analyses are completely mechanical, meaning that they require no human supervision. ...
For instance, we show that it is feasible to create a tool to discover naming bugs in Java programs -methods that have been improperly named. ...
We thank Jørn Inge Vestgården, Wolfgang Leister and Truls Fretland for useful comments and discussions, and the anonymous reviewers for their ...
doi:10.1109/scam.2007.18
dblp:conf/scam/HostO07
fatcat:6upmwbrubng4lbcx52viqrq55i
Content and expression-based copy recognition for intellectual property protection
2003
Proceedings of the 2003 ACM workshop on Digital rights management - DRM '03
This paper presents a way of fingerprinting text documents that can be used to identify content and expression similarities in documents, as a way of facilitating tracking of digital copies of works, to ...
Protection of copyrights and revenues of content owners in the digital world has been gaining importance in the recent years. ...
We have shown that abstracting away from the vocabulary of the documents can help improve performance on recognizing expression. ...
doi:10.1145/947390.947393
fatcat:qr3jfzf6dza4vidqysz7v77a5i
Content and expression-based copy recognition for intellectual property protection
2003
Proceedings of the 2003 ACM workshop on Digital rights management - DRM '03
This paper presents a way of fingerprinting text documents that can be used to identify content and expression similarities in documents, as a way of facilitating tracking of digital copies of works, to ...
Protection of copyrights and revenues of content owners in the digital world has been gaining importance in the recent years. ...
We have shown that abstracting away from the vocabulary of the documents can help improve performance on recognizing expression. ...
doi:10.1145/947380.947393
dblp:conf/drm/UzunerD03
fatcat:i6kxmtup25blvcl2oswyzt3hji
Comparison of Overlap Detection Techniques
[chapter]
2002
Lecture Notes in Computer Science
The applications of these methods are not limited to plagiarism detection but may target other copy-detection problems. ...
These previous methods share two common stages: chunking of documents and selection of representative chunks. ...
Copy-detection mechanisms may be used in many other scenarios. ...
doi:10.1007/3-540-46043-8_4
fatcat:ij6ekyl7ovevhnncwoahw3eopu
Tackling the Cybersecurity Impacts of the Coronavirus Outbreak as a Challenge to Internet Safety
2020
Figshare
Cybercriminals are exploiting the panic associated with COVID-19 to attack vulnerable digital assets using ransomware, email phishing and social engineering scams. ...
The impacts on the cyberspace are examined, and recommendations for digital behaviours are proffered to ensure user privacy and computer security even as the pandemic rages. ...
A good antivirus or anti-malware solution is able to apply an advanced detection mechanism [21] to detect the most common strings of malicious codes and can take actions to protect systems and data. ...
doi:10.6084/m9.figshare.12479159.v1
fatcat:utkq2sy65nfrjbd7h4bexp6drm
Towards Algorithmic Identification of Online Scams
[article]
2021
State-of-the-art anti-scam research still faces several challenges, such as automatically acquiring a labeled scam dataset and providing early detection and prevention mechanisms to attacks that use cryptocurrency ...
In this thesis, we implement a data-driven model to detect and track web-based scams with a web presence. ...
[21] proposed a detection mechanism with 96.8% TPR and a recall of 96.9%. However, the proposed mechanisms for Bitcoin HYIP detection do not provide early detection and defensive models. ...
doi:10.20381/ruor-27236
fatcat:xjmxk5q5yjhzbnspfmxsxz7spm
« Previous
Showing results 1 — 15 out of 1,228 results