Articles with "malicious users" as a keyword



Photo by arthurbizkit from unsplash

PhantomFS: File-Based Deception Technology for Thwarting Malicious Users

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2973700

Abstract: File-based deception technologies can be used as an additional security barrier when adversaries have successfully gained access to a host evading intrusion detection systems. Adversaries are detected if they access fake files. Though previous works… read more here.

Keywords: access; file; based deception; file based ... See more keywords
Photo by markusspiske from unsplash

Better Adaptive Malicious Users Detection Algorithm in Human Contact Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2022.3142626

Abstract: A human contact network (HCN) consists of individuals moving around and interacting with each other. In HCN, it is essential to detect malicious users who break the data delivery through terminating the data delivery or… read more here.

Keywords: malicious users; rate; users detection; human contact ... See more keywords
Photo by huntersrace from unsplash

Detect Professional Malicious User With Metric Learning in Recommender Systems

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Knowledge and Data Engineering"

DOI: 10.1109/tkde.2020.3040618

Abstract: In e-commerce, online retailers are usually suffering from professional malicious users (PMUs), who utilize negative reviews and low ratings to their consumed products on purpose to threaten the retailers for illegal profits. PMUs are difficult… read more here.

Keywords: malicious users; metric learning; professional malicious; detection ... See more keywords
Photo by gavinbiesheuvel from unsplash

Defense against Malicious Users in Cooperative Spectrum Sensing Using Genetic Algorithm

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Antennas and Propagation"

DOI: 10.1155/2018/2346317

Abstract: In cognitive radio network (CRN), secondary users (SUs) try to sense and utilize the vacant spectrum of the legitimate primary user (PU) in an efficient manner. The process of cooperation among SUs makes the sensing… read more here.

Keywords: user; malicious users; spectrum sensing; genetic algorithm ... See more keywords