Literatura académica sobre el tema "Credulous users"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Credulous users".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Credulous users"

1

Balestrucci, Alessandro, Rocco De Nicola, Marinella Petrocchi y Catia Trubiani. "A behavioural analysis of credulous Twitter users". Online Social Networks and Media 23 (mayo de 2021): 100133. http://dx.doi.org/10.1016/j.osnem.2021.100133.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Kumar, Harish, Anshal Prasad, Ninad Rane, Nilay Tamane y Anjali Yeole. "Dr. Phish: Phishing Website Detector". E3S Web of Conferences 297 (2021): 01032. http://dx.doi.org/10.1051/e3sconf/202129701032.

Texto completo
Resumen
Phishing is a common attack on credulous people by making them disclose their unique information. It is a type of cyber-crime where false sites allure exploited people to give delicate data. This paper deals with methods for detecting phishing websites by analyzing various features of URLs by Machine learning techniques. This experimentation discusses the methods used for detection of phishing websites based on lexical features, host properties and page importance properties. We consider various data mining algorithms for evaluation of the features in order to get a better understanding of the structure of URLs that spread phishing. To protect end users from visiting these sites, we can try to identify the phishing URLs by analyzing their lexical and host-based features.A particular challenge in this domain is that criminals are constantly making new strategies to counter our defense measures. To succeed in this contest, we need Machine Learning algorithms that continually adapt to new examples and features of phishing URLs.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Muthukumar, Steffina, S. D. Karthik, Diya D. Jain y Rohit Ravindran. "Cipher-Policy Attribute-Based Encryption on Cloud Computing". International Journal of Advanced Research in Science, Communication and Technology, 19 de mayo de 2021, 7–13. http://dx.doi.org/10.48175/ijarsct-1202.

Texto completo
Resumen
Cloud computing has drawn expanding interests from both scholastic and industry in the recent years because of its productiveness and low-cost management. Since it offers different types of assistance in an open organization, it is critical for users to utilize secure information for stockpiling and sharing data to guarantee information classification and data users protection. To safely Protect information, the most broadly utilized technique is encryption. The dual-access control, with regards to cloud-based storage, is a control system over both the data owner and the user who can upload and download files without loss of safety, data[1] and effectiveness. The credulous arrangement is that the user can download the whole database[2]. The framework planned in this paper is when the A user logs in with his credentials and after successful acceptance from the two different administrators, the user will be able to download the file present over the cloud. When a malicious user requests, the administrators can find it because it will generate a null value and they can block the user from downloading the files.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Capítulos de libros sobre el tema "Credulous users"

1

Inoue, Katsumi, Chiaki Sakama y Lena Wiese. "Confidentiality-Preserving Publishing of EDPs for Credulous and Skeptical Users". En Lecture Notes in Computer Science, 134–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41524-1_8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Balestrucci, Alessandro, Rocco De Nicola, Marinella Petrocchi y Catia Trubiani. "Do You Really Follow Them? Automatic Detection of Credulous Twitter Users". En Intelligent Data Engineering and Automated Learning – IDEAL 2019, 402–10. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33607-3_44.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Hofer-Robinson, Joanna. "Charles Dickens and Metropolitan Improvements". En Dickens and Demolition, 19–50. Edinburgh University Press, 2018. http://dx.doi.org/10.3366/edinburgh/9781474420983.003.0002.

Texto completo
Resumen
For readers who are unfamiliar with the historical contexts underpinning London’s improvement in the mid-nineteenth century, Chapter 1 offers an account of the processes and problems of improvement during Dickens’s lifetime. Addressing the fragmentation of the built environment and the diverse actors and institutions who commented on and influenced metropolitan developments, it suggests that the haphazard nature of improvement in the mid-nineteenth century dovetailed generatively with Dickens’s style and popularity, and that this enabled his works to be used effectively to promote urban change. Far from suggesting that people credulously accepted Dickens’s descriptions as “realistic” accounts of contemporary London conditions, however, this chapter (and, indeed, the book as a whole) argues that mid-nineteenth-century users of Dickens treated his novels as a store of widely known imagery that could be superimposed on to the urban environment. Afterlives were self-consciously curated to enable discussion about large and complex social problems, to make users’ critiques more pointed and memorable, or to curate legible representations of the city.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Keeley, Brian L. "The Credulity of Conspiracy Theorists". En Conspiracy Theories and the People Who Believe Them, 422–31. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190844073.003.0029.

Texto completo
Resumen
Where does entertaining (or promoting) conspiracy theories stand with respect to rational inquiry? According to one view, conspiracy theorists are open-minded skeptics, being careful not to accept uncritically common wisdom, exploring alternative explanations of events no matter how unlikely they might seem at first glance. Seen this way, they are akin to scientists attempting to explain the social world. On the other hand, they are also sometimes seen as overly credulous, believing everything they read on the Internet, say. In addition to conspiracy theorists and scientists, another significant form of explanation of the events of the world can be found in religious contexts, such as when a disaster is explained as being an “act of God.” By comparing conspiratorial thinking with scientific and religious forms of explanation, features of all three are brought into clearer focus. For example, anomalies and a commitment to naturalist explanation are seen as important elements of scientific explanation, although the details are less clear. This paper uses conspiracy theories as a lens through which to investigate rational or scientific inquiry. In addition, a better understanding of the scientific method as it might be applied in the study of events of interest to conspiracy theorists can help understand their epistemic virtues and vices.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Credulous users"

1

Balestrucci, Alessandro, Rocco De Nicola, Omar Inverso y Catia Trubiani. "Identification of credulous users on Twitter". En SAC '19: The 34th ACM/SIGAPP Symposium on Applied Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3297280.3297486.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Balestrucci, Alessandro y Rocco De Nicola. "Credulous Users and Fake News: a Real Case Study on the Propagation in Twitter". En 2020 IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS). IEEE, 2020. http://dx.doi.org/10.1109/eais48028.2020.9122764.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía