Littérature scientifique sur le sujet « Credulous users »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Credulous users ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Credulous users"

1

Balestrucci, Alessandro, Rocco De Nicola, Marinella Petrocchi et Catia Trubiani. « A behavioural analysis of credulous Twitter users ». Online Social Networks and Media 23 (mai 2021) : 100133. http://dx.doi.org/10.1016/j.osnem.2021.100133.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Kumar, Harish, Anshal Prasad, Ninad Rane, Nilay Tamane et Anjali Yeole. « Dr. Phish : Phishing Website Detector ». E3S Web of Conferences 297 (2021) : 01032. http://dx.doi.org/10.1051/e3sconf/202129701032.

Texte intégral
Résumé :
Phishing is a common attack on credulous people by making them disclose their unique information. It is a type of cyber-crime where false sites allure exploited people to give delicate data. This paper deals with methods for detecting phishing websites by analyzing various features of URLs by Machine learning techniques. This experimentation discusses the methods used for detection of phishing websites based on lexical features, host properties and page importance properties. We consider various data mining algorithms for evaluation of the features in order to get a better understanding of the structure of URLs that spread phishing. To protect end users from visiting these sites, we can try to identify the phishing URLs by analyzing their lexical and host-based features.A particular challenge in this domain is that criminals are constantly making new strategies to counter our defense measures. To succeed in this contest, we need Machine Learning algorithms that continually adapt to new examples and features of phishing URLs.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Muthukumar, Steffina, S. D. Karthik, Diya D. Jain et Rohit Ravindran. « Cipher-Policy Attribute-Based Encryption on Cloud Computing ». International Journal of Advanced Research in Science, Communication and Technology, 19 mai 2021, 7–13. http://dx.doi.org/10.48175/ijarsct-1202.

Texte intégral
Résumé :
Cloud computing has drawn expanding interests from both scholastic and industry in the recent years because of its productiveness and low-cost management. Since it offers different types of assistance in an open organization, it is critical for users to utilize secure information for stockpiling and sharing data to guarantee information classification and data users protection. To safely Protect information, the most broadly utilized technique is encryption. The dual-access control, with regards to cloud-based storage, is a control system over both the data owner and the user who can upload and download files without loss of safety, data[1] and effectiveness. The credulous arrangement is that the user can download the whole database[2]. The framework planned in this paper is when the A user logs in with his credentials and after successful acceptance from the two different administrators, the user will be able to download the file present over the cloud. When a malicious user requests, the administrators can find it because it will generate a null value and they can block the user from downloading the files.
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Credulous users"

1

Inoue, Katsumi, Chiaki Sakama et Lena Wiese. « Confidentiality-Preserving Publishing of EDPs for Credulous and Skeptical Users ». Dans Lecture Notes in Computer Science, 134–51. Berlin, Heidelberg : Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41524-1_8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Balestrucci, Alessandro, Rocco De Nicola, Marinella Petrocchi et Catia Trubiani. « Do You Really Follow Them ? Automatic Detection of Credulous Twitter Users ». Dans Intelligent Data Engineering and Automated Learning – IDEAL 2019, 402–10. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33607-3_44.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Hofer-Robinson, Joanna. « Charles Dickens and Metropolitan Improvements ». Dans Dickens and Demolition, 19–50. Edinburgh University Press, 2018. http://dx.doi.org/10.3366/edinburgh/9781474420983.003.0002.

Texte intégral
Résumé :
For readers who are unfamiliar with the historical contexts underpinning London’s improvement in the mid-nineteenth century, Chapter 1 offers an account of the processes and problems of improvement during Dickens’s lifetime. Addressing the fragmentation of the built environment and the diverse actors and institutions who commented on and influenced metropolitan developments, it suggests that the haphazard nature of improvement in the mid-nineteenth century dovetailed generatively with Dickens’s style and popularity, and that this enabled his works to be used effectively to promote urban change. Far from suggesting that people credulously accepted Dickens’s descriptions as “realistic” accounts of contemporary London conditions, however, this chapter (and, indeed, the book as a whole) argues that mid-nineteenth-century users of Dickens treated his novels as a store of widely known imagery that could be superimposed on to the urban environment. Afterlives were self-consciously curated to enable discussion about large and complex social problems, to make users’ critiques more pointed and memorable, or to curate legible representations of the city.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Keeley, Brian L. « The Credulity of Conspiracy Theorists ». Dans Conspiracy Theories and the People Who Believe Them, 422–31. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190844073.003.0029.

Texte intégral
Résumé :
Where does entertaining (or promoting) conspiracy theories stand with respect to rational inquiry? According to one view, conspiracy theorists are open-minded skeptics, being careful not to accept uncritically common wisdom, exploring alternative explanations of events no matter how unlikely they might seem at first glance. Seen this way, they are akin to scientists attempting to explain the social world. On the other hand, they are also sometimes seen as overly credulous, believing everything they read on the Internet, say. In addition to conspiracy theorists and scientists, another significant form of explanation of the events of the world can be found in religious contexts, such as when a disaster is explained as being an “act of God.” By comparing conspiratorial thinking with scientific and religious forms of explanation, features of all three are brought into clearer focus. For example, anomalies and a commitment to naturalist explanation are seen as important elements of scientific explanation, although the details are less clear. This paper uses conspiracy theories as a lens through which to investigate rational or scientific inquiry. In addition, a better understanding of the scientific method as it might be applied in the study of events of interest to conspiracy theorists can help understand their epistemic virtues and vices.
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Credulous users"

1

Balestrucci, Alessandro, Rocco De Nicola, Omar Inverso et Catia Trubiani. « Identification of credulous users on Twitter ». Dans SAC '19 : The 34th ACM/SIGAPP Symposium on Applied Computing. New York, NY, USA : ACM, 2019. http://dx.doi.org/10.1145/3297280.3297486.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Balestrucci, Alessandro, et Rocco De Nicola. « Credulous Users and Fake News : a Real Case Study on the Propagation in Twitter ». Dans 2020 IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS). IEEE, 2020. http://dx.doi.org/10.1109/eais48028.2020.9122764.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie