Smartphones are compatible and easily accessible compared to computers irrespective of place and time. Smartphones merge with our routine which acts as a medium of communication in several ways such as messaging, voic...
详细信息
Malware represents the greatest threat to cybersecurity and serves as the weapon of choice for carrying out nefarious activities in the digital realm. The proliferation of malware poses significant risks to individual...
详细信息
The rapid adoption of online social media platforms has transformed the way of communication and *** these platforms,discussions in the form of trending topics provide a glimpse of events happening around the world in...
详细信息
The rapid adoption of online social media platforms has transformed the way of communication and *** these platforms,discussions in the form of trending topics provide a glimpse of events happening around the world in ***,these trends are used for political campaigns,public awareness,and brand ***,these trends are sensitive to manipulation by malicious users who aim to mislead the mass *** this article,we identify and study the characteristics of users involved in the manipulation of Twitter trends in *** propose“Manipify”-a framework for automatic detection and analysis of malicious users in Twitter *** framework consists of three distinct modules:(1)user classifier,(2)hashtag classifier,and(3)trend *** user classifier module introduces a novel approach to automatically detect manipulators using tweet content and user behaviour ***,the module classifies human and bot ***,the hashtag classifier categorizes trending hashtags into six categories assisting in examining manipulators behaviour across different ***,the trend analyzer module examines users,hashtags,and tweets for hashtag reach,linguistic features,and user *** user classifier module achieves 0.92 and 0.98 accuracy in classifying manipulators and bots,*** further test Manipify on the dataset comprising 652 trending hashtags with 5.4 million tweets and 1.9 million *** analysis of trends reveals that the trending panel is mostly dominated by political *** addition,our results show a higher contribution of human accounts in trend manipulation as compared to bots.
Classification of malwares and viruses is a very important work in the cyber security field to protect the computers and systems from threats and attacks. In this paper, we proposed a novel approach for the classifica...
详细信息
Railway accidents are an under-scrutinised cause of death in India. Train accidents are caused by various consequences of collisions, derailments, signal errors and so on. Furthermore, when train derailments become di...
详细信息
Parallel Disassembly Sequence Planning (DSP) deals with obtaining the order of disassembling the product with multiple parts disassembling simultaneously. Existing studies derive the product’s disassembly order based...
详细信息
The rapid expansion of Internet of Things (IoT) devices and applications necessitates the need for more efficient computational and data management strategies. The Fog-enabled UAV-as-a-Service (FU-Serve) platform addr...
详细信息
The external attention mechanism offers a promising approach to enhance image anomaly detection (Hayakawa et al., in: IMPROVE, pp. 100-–110, 2023). Nevertheless, the effectiveness of this method is contingent upon th...
详细信息
The main objective of this study is to contribute to multilingual discourse research by employing ISO-24617 Part 8 (Semantic Relations in Discourse, Core Annotation Schema – DR-core) for annotating discourse relation...
详细信息
Capturing the distributed platform with remotely controlled compromised machines using botnet is extensively analyzed by various ***,certain limitations need to be addressed *** provisioning of detection mechanism wit...
详细信息
Capturing the distributed platform with remotely controlled compromised machines using botnet is extensively analyzed by various ***,certain limitations need to be addressed *** provisioning of detection mechanism with learning approaches provides a better solution more broadly by saluting multi-objective *** bots’patterns or features over the network have to be analyzed in both linear and non-linear *** linear and non-linear features are composed of high-level and low-level *** collected features are maintained over the Bag of Features(BoF)where the most influencing features are collected and provided into the classifier ***,the linearity and non-linearity of the threat are evaluated with Support Vector Machine(SVM).Next,with the collected BoF,the redundant features are eliminated as it triggers overhead towards the predictor ***,a novel Incoming data Redundancy Elimination-based learning model(RedE-L)is built to classify the network features to provide robustness towards BotNets *** simulation is carried out in MATLAB environment,and the evaluation of proposed RedE-L model is performed with various online accessible network traffic dataset(benchmark dataset).The proposed model intends to show better tradeoff compared to the existing approaches like conventional SVM,C4.5,RepTree and so ***,various metrics like Accuracy,detection rate,Mathews Correlation Coefficient(MCC),and some other statistical analysis are performed to show the proposed RedE-L model's *** F1-measure is 99.98%,precision is 99.93%,Accuracy is 99.84%,TPR is 99.92%,TNR is 99.94%,FNR is 0.06 and FPR is 0.06 respectively.
暂无评论