Filters








1,228 Hits in 5.3 sec

The SCAM Approach to Copy Detection in Digital Libraries

Narayanan Shivakumar, Hector Garcia-Molina
1995 D-Lib Magazine  
Funding for this cooperative agreement is also provided by ARPA, NASA, and the industrial partners of the Stanford Digital Libraries Project. .  ...  MDA972-92-J-1029 with the Corporation for National Research Initiatives (CNRI). The research is also partially supported by the National Science Foundation under Cooperative Agreement IRI-9411306.  ...  In Architecture of SCAM (below), we present the underlying registration mechanism of SCAM that could be used as a "plug-in" module for copy detection in a system such as SIFT.  ... 
doi:10.1045/november95-shivakumar fatcat:kd2ynerasndypcglmbuhnbydjm

Cryptocurrency scams: analysis and perspectives

Massimo Bartoletti, Stefano Lande, Andrea Loddo, Livio Pompianu, Sergio Serusi
2021 IEEE Access  
However, doing research in this field requires addressing several challenges: for instance, although a few data sources about cryptocurrency scams are publicly available, they often contain incomplete  ...  Indeed, the unavailability of reliable datasets makes it difficult to train effective automatic classifiers that can detect and analyse cryptocurrency scams.  ...  For these reasons, we crawl Web Archive, a digital archive of the World Wide Web, also containing snapshots (i.e., archived copies) of now offline sites.  ... 
doi:10.1109/access.2021.3123894 fatcat:k3zt6cww2vc2nbx2xtgffyok7y

Creative Accounting Scam at Satyam Computer Limited: How the Fraud Story Unfolded?

Madan Lal Bhasin
2016 Open Journal of Accounting  
An attempt has been made to provide an explanation for various "intriguing" questions about Satyam scam, such as: What was the need to commit a fraud on such a large scale?  ...  What was Raju's real modus-operandi to manipulate the accounts for eight years? Why was Raju forced to blow his own whistle?  ...  Several commentators criticized PwC harshly for failing to detect the fraud [32].  ... 
doi:10.4236/ojacct.2016.54007 fatcat:sjwv2gafzbgrpo3xwc2mgd6ffe

Security Smells in Android

Mohammad Ghafari, Pascal Gadient, Oscar Nierstrasz
2017 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM)  
However, each study has often dealt with a specific issue, making the results less actionable for practitioners.  ...  Moreover, we develop a lightweight static analysis tool and discuss the extent to which it successfully detects several vulnerabilities in about 46,000 apps hosted by the official Android market.  ...  Mitigation: Use libraries that provide strong documentation and working code examples, and rely on simplified APIs with secure defaults [2] . • Unpinned Certificate Digital certificates are needed to  ... 
doi:10.1109/scam.2017.24 dblp:conf/scam/GhafariGN17 fatcat:jp7ru6x4xzcjhm33w2bebl6vs4

A Plagiarism Detection System for Malayalam Text Based Documents with Full and Partial Copy

L. Sindhu, Sumam Mary Idicula
2016 Procedia Technology - Elsevier  
In this paper, a technique for detecting full and partial copies is proposed.  ...  Many document copy detection systems have been proposed ,but an efficient detection system for Malayalam documents is not available.  ...  In this paper , a method for copy detection where copy of part of a document or the entire document can be detected was discussed.  ... 
doi:10.1016/j.protcy.2016.08.120 fatcat:vkrg4ifvs5fnzdelel7bi7ufoi

Document overlap detection system for distributed digital libraries

Krisztián Monostori, Arkdy Zaslavsky, Heinz Schmidt
2000 Proceedings of the fifth ACM conference on Digital libraries - DL '00  
The matching-engine component uses a modified suffix tree representation, which is able to identify the exact overlapping chunks and its performance is also presented.  ...  In this paper we introduce the MatchDetectReveal(MDR) system, which is capable of identifying overlapping and plagiarised documents. Each component of the system is briefly described.  ...  Copy-detection mechanisms may be used as a filter on search results, which excludes documents that overlap with documents above a certain threshold.  ... 
doi:10.1145/336597.336667 dblp:conf/dl/MonostoriZS00 fatcat:k55xyj7qwbgfzc4jqhw5k6ijd4

Parallel and Distributed Document Overlap Detection on the Web [chapter]

Krisztián Monostori, Arkady Zaslavsky, Heinz Schmidt
2001 Lecture Notes in Computer Science  
Documents are easily copied and redistributed or used to create plagiarised assignments and conference papers. This paper presents a new, two-stage approach for identifying overlapping documents.  ...  Proliferation of digital libraries plus availability of electronic documents from the Internet have created new challenges for computer science researchers and professionals.  ...  Acknowledgment Support from Distributed Systems Technology Centre (DSTC Pty Ltd) for this project is thankfully acknowledged.  ... 
doi:10.1007/3-540-70734-4_25 fatcat:ld2waogdknesjfa4542fm5c4kq

Survey of Text Plagiarism Detection

Ahmed Hamza Osman, Naomie Salim, Albaraa Abuobieda
2012 Computer Engineering and Applications Journal  
It was found that many of the proposed methods for plagiarism detection have a weakness and lacking for detecting some types of plagiarized text.  ...  This paper discussed several important issues in plagiarism detection such as; plagiarism detection Tasks, plagiarism detection process and some of the current plagiarism detection techniques.DOI: 10.18495  ...  The authors would like to thank International University of Africa (IUA) and Research Management Centre (RMC) Universiti Teknologi Malaysia for the support and incentive extended in making this study a  ... 
doi:10.18495/comengapp.v1i1.5 fatcat:xyvk24mevvhgpokhyn3bgo64ge

SISTEM DETEKSI DINI PLAGIARISME TUGAS AKHIR MAHASISWA MENGGUNAKAN ALGORITMA NGRAMS DAN WINNOWING

Rocky Yefrenes Dillak, Folkes Laumal, Ledy Jen Kadja
2016 Jurnal Ilmiah Flash  
Based on experiments, the result is indicated that the method can be used as an early warning system for plagiarism detection.  ...  It became more complicated when the resources used were taken from a different language with a suspicious document.  ...  Oleh karena itu, penulis menggagas untuk dibangunnya sebuah sistem deteksi plagiat (Plagiarism detection system) yang menggunakan SCAM (Stanford Copy Analysis Mechanism).  ... 
doi:10.32511/jiflash.v2i1.19 fatcat:ucirpbwrt5bphc3uifrtrf2omm

The Programmer's Lexicon, Volume I: The Verbs

Einar W. Host, Bjarte M. Ostvold
2007 Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)  
Our analyses are completely mechanical, meaning that they require no human supervision.  ...  For instance, we show that it is feasible to create a tool to discover naming bugs in Java programs -methods that have been improperly named.  ...  We thank Jørn Inge Vestgården, Wolfgang Leister and Truls Fretland for useful comments and discussions, and the anonymous reviewers for their  ... 
doi:10.1109/scam.2007.18 dblp:conf/scam/HostO07 fatcat:6upmwbrubng4lbcx52viqrq55i

Content and expression-based copy recognition for intellectual property protection

Özlem Uzuner, Randall Davis
2003 Proceedings of the 2003 ACM workshop on Digital rights management - DRM '03  
This paper presents a way of fingerprinting text documents that can be used to identify content and expression similarities in documents, as a way of facilitating tracking of digital copies of works, to  ...  Protection of copyrights and revenues of content owners in the digital world has been gaining importance in the recent years.  ...  We have shown that abstracting away from the vocabulary of the documents can help improve performance on recognizing expression.  ... 
doi:10.1145/947390.947393 fatcat:qr3jfzf6dza4vidqysz7v77a5i

Content and expression-based copy recognition for intellectual property protection

Özlem Uzuner, Randall Davis
2003 Proceedings of the 2003 ACM workshop on Digital rights management - DRM '03  
This paper presents a way of fingerprinting text documents that can be used to identify content and expression similarities in documents, as a way of facilitating tracking of digital copies of works, to  ...  Protection of copyrights and revenues of content owners in the digital world has been gaining importance in the recent years.  ...  We have shown that abstracting away from the vocabulary of the documents can help improve performance on recognizing expression.  ... 
doi:10.1145/947380.947393 dblp:conf/drm/UzunerD03 fatcat:i6kxmtup25blvcl2oswyzt3hji

Comparison of Overlap Detection Techniques [chapter]

Krisztián Monostori, Raphael Finkel, Arkady Zaslavsky, Gábor Hodász, Máté Pataki
2002 Lecture Notes in Computer Science  
The applications of these methods are not limited to plagiarism detection but may target other copy-detection problems.  ...  These previous methods share two common stages: chunking of documents and selection of representative chunks.  ...  Copy-detection mechanisms may be used in many other scenarios.  ... 
doi:10.1007/3-540-46043-8_4 fatcat:ij6ekyl7ovevhnncwoahw3eopu

Tackling the Cybersecurity Impacts of the Coronavirus Outbreak as a Challenge to Internet Safety

KENNETH OKEREAFOR, Olajide Adebola
2020 Figshare  
Cybercriminals are exploiting the panic associated with COVID-19 to attack vulnerable digital assets using ransomware, email phishing and social engineering scams.  ...  The impacts on the cyberspace are examined, and recommendations for digital behaviours are proffered to ensure user privacy and computer security even as the pandemic rages.  ...  A good antivirus or anti-malware solution is able to apply an advanced detection mechanism [21] to detect the most common strings of malicious codes and can take actions to protect systems and data.  ... 
doi:10.6084/m9.figshare.12479159.v1 fatcat:utkq2sy65nfrjbd7h4bexp6drm

Towards Algorithmic Identification of Online Scams [article]

Emad Mohammad Hussein Badawi, University, My
2021
State-of-the-art anti-scam research still faces several challenges, such as automatically acquiring a labeled scam dataset and providing early detection and prevention mechanisms to attacks that use cryptocurrency  ...  In this thesis, we implement a data-driven model to detect and track web-based scams with a web presence.  ...  [21] proposed a detection mechanism with 96.8% TPR and a recall of 96.9%. However, the proposed mechanisms for Bitcoin HYIP detection do not provide early detection and defensive models.  ... 
doi:10.20381/ruor-27236 fatcat:xjmxk5q5yjhzbnspfmxsxz7spm
« Previous Showing results 1 — 15 out of 1,228 results