Добірка наукової літератури з теми "Credulous users"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Credulous users".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Credulous users"

1

Balestrucci, Alessandro, Rocco De Nicola, Marinella Petrocchi, and Catia Trubiani. "A behavioural analysis of credulous Twitter users." Online Social Networks and Media 23 (May 2021): 100133. http://dx.doi.org/10.1016/j.osnem.2021.100133.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Kumar, Harish, Anshal Prasad, Ninad Rane, Nilay Tamane, and Anjali Yeole. "Dr. Phish: Phishing Website Detector." E3S Web of Conferences 297 (2021): 01032. http://dx.doi.org/10.1051/e3sconf/202129701032.

Повний текст джерела
Анотація:
Phishing is a common attack on credulous people by making them disclose their unique information. It is a type of cyber-crime where false sites allure exploited people to give delicate data. This paper deals with methods for detecting phishing websites by analyzing various features of URLs by Machine learning techniques. This experimentation discusses the methods used for detection of phishing websites based on lexical features, host properties and page importance properties. We consider various data mining algorithms for evaluation of the features in order to get a better understanding of the structure of URLs that spread phishing. To protect end users from visiting these sites, we can try to identify the phishing URLs by analyzing their lexical and host-based features.A particular challenge in this domain is that criminals are constantly making new strategies to counter our defense measures. To succeed in this contest, we need Machine Learning algorithms that continually adapt to new examples and features of phishing URLs.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Muthukumar, Steffina, S. D. Karthik, Diya D. Jain, and Rohit Ravindran. "Cipher-Policy Attribute-Based Encryption on Cloud Computing." International Journal of Advanced Research in Science, Communication and Technology, May 19, 2021, 7–13. http://dx.doi.org/10.48175/ijarsct-1202.

Повний текст джерела
Анотація:
Cloud computing has drawn expanding interests from both scholastic and industry in the recent years because of its productiveness and low-cost management. Since it offers different types of assistance in an open organization, it is critical for users to utilize secure information for stockpiling and sharing data to guarantee information classification and data users protection. To safely Protect information, the most broadly utilized technique is encryption. The dual-access control, with regards to cloud-based storage, is a control system over both the data owner and the user who can upload and download files without loss of safety, data[1] and effectiveness. The credulous arrangement is that the user can download the whole database[2]. The framework planned in this paper is when the A user logs in with his credentials and after successful acceptance from the two different administrators, the user will be able to download the file present over the cloud. When a malicious user requests, the administrators can find it because it will generate a null value and they can block the user from downloading the files.
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Credulous users"

1

Inoue, Katsumi, Chiaki Sakama, and Lena Wiese. "Confidentiality-Preserving Publishing of EDPs for Credulous and Skeptical Users." In Lecture Notes in Computer Science, 134–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41524-1_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Balestrucci, Alessandro, Rocco De Nicola, Marinella Petrocchi, and Catia Trubiani. "Do You Really Follow Them? Automatic Detection of Credulous Twitter Users." In Intelligent Data Engineering and Automated Learning – IDEAL 2019, 402–10. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33607-3_44.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Hofer-Robinson, Joanna. "Charles Dickens and Metropolitan Improvements." In Dickens and Demolition, 19–50. Edinburgh University Press, 2018. http://dx.doi.org/10.3366/edinburgh/9781474420983.003.0002.

Повний текст джерела
Анотація:
For readers who are unfamiliar with the historical contexts underpinning London’s improvement in the mid-nineteenth century, Chapter 1 offers an account of the processes and problems of improvement during Dickens’s lifetime. Addressing the fragmentation of the built environment and the diverse actors and institutions who commented on and influenced metropolitan developments, it suggests that the haphazard nature of improvement in the mid-nineteenth century dovetailed generatively with Dickens’s style and popularity, and that this enabled his works to be used effectively to promote urban change. Far from suggesting that people credulously accepted Dickens’s descriptions as “realistic” accounts of contemporary London conditions, however, this chapter (and, indeed, the book as a whole) argues that mid-nineteenth-century users of Dickens treated his novels as a store of widely known imagery that could be superimposed on to the urban environment. Afterlives were self-consciously curated to enable discussion about large and complex social problems, to make users’ critiques more pointed and memorable, or to curate legible representations of the city.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Keeley, Brian L. "The Credulity of Conspiracy Theorists." In Conspiracy Theories and the People Who Believe Them, 422–31. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190844073.003.0029.

Повний текст джерела
Анотація:
Where does entertaining (or promoting) conspiracy theories stand with respect to rational inquiry? According to one view, conspiracy theorists are open-minded skeptics, being careful not to accept uncritically common wisdom, exploring alternative explanations of events no matter how unlikely they might seem at first glance. Seen this way, they are akin to scientists attempting to explain the social world. On the other hand, they are also sometimes seen as overly credulous, believing everything they read on the Internet, say. In addition to conspiracy theorists and scientists, another significant form of explanation of the events of the world can be found in religious contexts, such as when a disaster is explained as being an “act of God.” By comparing conspiratorial thinking with scientific and religious forms of explanation, features of all three are brought into clearer focus. For example, anomalies and a commitment to naturalist explanation are seen as important elements of scientific explanation, although the details are less clear. This paper uses conspiracy theories as a lens through which to investigate rational or scientific inquiry. In addition, a better understanding of the scientific method as it might be applied in the study of events of interest to conspiracy theorists can help understand their epistemic virtues and vices.
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Credulous users"

1

Balestrucci, Alessandro, Rocco De Nicola, Omar Inverso, and Catia Trubiani. "Identification of credulous users on Twitter." In SAC '19: The 34th ACM/SIGAPP Symposium on Applied Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3297280.3297486.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Balestrucci, Alessandro, and Rocco De Nicola. "Credulous Users and Fake News: a Real Case Study on the Propagation in Twitter." In 2020 IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS). IEEE, 2020. http://dx.doi.org/10.1109/eais48028.2020.9122764.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії