Int. J. Soc. Comput. Cyber Phys. Syst.最新文献

筛选
英文 中文
Detecting malicious users in the social networks using machine learning approach 利用机器学习方法检测社交网络中的恶意用户
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 2021-09-17 DOI: 10.1504/ijsccps.2021.117959
H. L. Gururaj, U. Tanuja, V. Janhavi, B. Ramesh
{"title":"Detecting malicious users in the social networks using machine learning approach","authors":"H. L. Gururaj, U. Tanuja, V. Janhavi, B. Ramesh","doi":"10.1504/ijsccps.2021.117959","DOIUrl":"https://doi.org/10.1504/ijsccps.2021.117959","url":null,"abstract":"Social networking plays a very important role in today's life. It helps to share ideas, information, multimedia messages and also provides the means of communication between the users. The popular social medias such as Facebook, Twitter, Instagram, etc., where the billions of data are being created in huge volume. Every user has their right to use any social media and a large number of users allowed malicious users by providing private or sensitive information, which results in security threats. In this research, they are proposing an natural language processing (NLP) technique to find suspicious users based on the daily conversations between the users. They demonstrated the behaviour of each user through their anomaly activities. Another machine learning technique called support vector machine (SVM) classifiers to detect the toxic comments in the comments blog. In this paper, the preliminary work concentrates on detecting the malicious user through the anomaly activities, behaviour profiles, messages and comment section.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124385583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The troika of artificial intelligence, emotional intelligence and customer intelligence 人工智能、情商和客户智能这三驾马车
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 2019-06-14 DOI: 10.1504/IJSCCPS.2019.100195
Manish Sharma, Shikha N. Khera, P. B. Sharma
{"title":"The troika of artificial intelligence, emotional intelligence and customer intelligence","authors":"Manish Sharma, Shikha N. Khera, P. B. Sharma","doi":"10.1504/IJSCCPS.2019.100195","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2019.100195","url":null,"abstract":"Emotional intelligence is to recognise emotions and emotions can be recognised by analysing face. Face reflects emotions, and thus facial images can help to identify emotions. Emotions recognition can help in conducting qualitative market research techniques like focus groups; in-depth interviews and other which can be used to generate customer intelligence. This paper provides a cross-disciplinary view of Intelligence. This paper proposes a machine learning-based model to accomplish the task of identifying emotions from given facial images. This paper uses a public database and divides the images into four groups. The feature extraction has been done by principal component analysis and the feature selection by fisher discriminant ratio. The classification has been done by support vector machine using k cross-validation. The accuracy, specificity and sensitivity are encouraging. The average accuracy is 0.84","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122189305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication schemes for social network users: a review 社交网络用户认证方案综述
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 2019-06-14 DOI: 10.1504/IJSCCPS.2019.100199
Swapnil S. Ninawe, P. Venkataram
{"title":"Authentication schemes for social network users: a review","authors":"Swapnil S. Ninawe, P. Venkataram","doi":"10.1504/IJSCCPS.2019.100199","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2019.100199","url":null,"abstract":"Social networks have been very successful for information sharing due to the rapid development of communication and networking. As the technology modernised and many unprotected types of equipment are used in sharing information like events, knowledge, activities, etc., there is a need for a high protection of social networking sites by providing dynamic authentication for social networks users. It is no longer a question of determining whether a user is who or what he/she is declared to be, but it is essential to design a convenient and credible authentication based on activity, relation, etc., of users. Managing and handling such authentication of users is complex and hard for which broad range of technologies need to be called. In this paper, we review some of the existing authentication schemes for social network users. Mainly, we highlight advantages of the existing schemes along with some of the improvements that can be incorporated. We also highlight some of the attacks and their prevention in social networks.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133867574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber-squatting: a cyber crime more than an unethical act 域名抢注:不仅仅是不道德的行为,更是一种网络犯罪
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 2019-06-14 DOI: 10.1504/IJSCCPS.2019.100197
Ramesh Chandra, Vaibhav Bhatnagar
{"title":"Cyber-squatting: a cyber crime more than an unethical act","authors":"Ramesh Chandra, Vaibhav Bhatnagar","doi":"10.1504/IJSCCPS.2019.100197","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2019.100197","url":null,"abstract":"Cyber-crimes are increasing day by day. They equally affect a person or a society as compared to other crimes. There are so many cyber-crimes such as hacking, phishing and cyber terrorism, etc. However there are some unethical activities that also affect a person or society such as cyber-squatting. This paper gives a glance about cyber-squatting which is consider as unethical practice, but as per the rate it is increasing day by day it is becoming necessary that it should be included in constitution. This paper illustrates cyber-squatting with the help of examples and some case studies.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121319292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy-preserving targeted online advertising 保护隐私的定向在线广告
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 2019-06-14 DOI: 10.1504/IJSCCPS.2019.100196
Ainish Dave, Hardik Gajera, M. Das
{"title":"Privacy-preserving targeted online advertising","authors":"Ainish Dave, Hardik Gajera, M. Das","doi":"10.1504/IJSCCPS.2019.100196","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2019.100196","url":null,"abstract":"Preserving privacy of the user data is one of the important requirements in several practical applications. In recent times, the targeted advertisement is found a potential business model that the services provider can use it for revenue growth. As the advertising server (ad-server) tracks the user's activity through the user's browsing history or through the user's mobile application feature for future purposes, the privacy of user's data could fall in hand of many parties without the knowledge of the user. In this paper, a scheme for privacy preserving targeted online advertisement is presented. The proposed scheme uses homomorphic encryption aiming at extracting keywords from web pages in real-time when a user is browsing web pages. A user can avail the services privately from the ad-server by perform the computation on encrypted data stored in the server. The proposed scheme is compared with some related schemes and the experimental results show that the proposed scheme is efficient and practical","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115740436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of an efficient and intelligent Indian maritime borderline alert system using IoT 利用物联网实施高效智能的印度海上边界警报系统
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 2019-06-14 DOI: 10.1504/IJSCCPS.2019.100184
M. Jerlin, Anindya Das, Joshua Agbonjaru
{"title":"Implementation of an efficient and intelligent Indian maritime borderline alert system using IoT","authors":"M. Jerlin, Anindya Das, Joshua Agbonjaru","doi":"10.1504/IJSCCPS.2019.100184","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2019.100184","url":null,"abstract":"The sea border issues are crucial to nations where it is hard to have a track of boarder for fishermen. About 180,000 fishing vessels of assorted forms are involved in fishing along the Indian-Sri Lankan maritime border. But fishing activities in that region has always been an agitating factor, ever since violence broke out in Sri Lanka about three decades ago. This problem however this can be solved only by an efficient and intelligent boundary alert system using IoT. Internet of things has the technology to make it possible for monitoring the sea border levels to know the border location. The Intelligent Maritime Borderline Alter System or IMBAS incorporates the new methodology of IoT for saving the fishermen's life as well as their sole assets in which their mode of income depends. The methodology includes tracking the position of the boat in real time using a differential GPS system and keeping the boat in safe waters, well inside the Indian Territory. The system will also notify the ground control as and when the boat approaches the maritime borderline.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127501272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big data analytics in healthcare: opportunities, challenges and techniques 医疗保健中的大数据分析:机遇、挑战和技术
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 2017-12-19 DOI: 10.1504/IJSCCPS.2017.10005265
Madhu Kumari, Singh Vijendra
{"title":"Big data analytics in healthcare: opportunities, challenges and techniques","authors":"Madhu Kumari, Singh Vijendra","doi":"10.1504/IJSCCPS.2017.10005265","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2017.10005265","url":null,"abstract":"Big data has evolved as a most challenging field of study and research area. It has drawn much attention during the last few years and influences our modern society including business, government, healthcare, and in research in almost every discipline. Big data has a huge potential to improve healthcare. A proper analysis of existing healthcare data fabricates most suitable predictive results and cut the cost and time of treatment. The collaboration of IT and healthcare industry has revolutionarised the healthcare management system. This paper attempts to merge the description of big data by integrating various concepts and definitions from the different researchers and academicians. This paper highlights the potential and corresponding challenges in healthcare data analysis. A summarisation on different research trends within healthcare data analysis is presented.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127035675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data sharing sensitivity, relevance, and social traits in social information retrieval 社会信息检索中的数据共享敏感性、相关性与社会特征
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 2017-12-19 DOI: 10.1504/IJSCCPS.2017.10009736
Christoph Fuchs, Georg Groh
{"title":"Data sharing sensitivity, relevance, and social traits in social information retrieval","authors":"Christoph Fuchs, Georg Groh","doi":"10.1504/IJSCCPS.2017.10009736","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2017.10009736","url":null,"abstract":"This paper evaluates a social information retrieval system where users can query each other for information. The approached user can reply to queries ('manual mode scenario') based on her knowledge. In addition, a social product search scenario is evaluated, where results are enriched with items bought or viewed by a social peer group ('social product search scenario'). Each scenario is tested with more than 120 participants. Our findings suggest that asking others reveals relevant results. The injection of socially motivated result items in result list for product queries did not increase quality. Users share more private information using strong ties. In addition, a reactive sharing pattern (which does not rely on previously published material, but queries directly using a pull regime) increases the amount of data for social information retrieval. The majority of questions covered recommendations in media, travel, technology, and food and personal opinions on technology-related topics and travel.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130432412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chaos based novel cryptographic technique based on a new logistic map 基于一种新的逻辑映射的混沌密码技术
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 2017-12-19 DOI: 10.1504/IJSCCPS.2017.10009740
A. A. Shah, S. A. Parah
{"title":"Chaos based novel cryptographic technique based on a new logistic map","authors":"A. A. Shah, S. A. Parah","doi":"10.1504/IJSCCPS.2017.10009740","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2017.10009740","url":null,"abstract":"In today's information age, a lot of data is being transferred over insecure channels like intranet and internet. This data needs to be secured against various attacks from an eavesdropper/intruder, etc. Of late chaotic encryption has caught the attention of research community round the globe for securing data, due to excellent characteristics of chaos such as data mixing, sensitivity to initial conditions, and ergodicity. In this work, we propose a novel modular logistic map (MLM) and show that it has better properties like larger Lyapunov exponent (LE), uniform invariant density, mixing and higher range of bifurcation parameter, etc., compared to basic logistic map. We have further exploited these properties of MLM for designing a secure robust, strong and efficient text cryptosystem. It has been further shown that encryption and decryption time using proposed scheme is quite small and hence the proposed cryptosystem suitable for real-time encryption applications.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130922021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of Lorenz-chaos and exclusive-OR based image encryption scheme 基于lorenz混沌和异或的图像加密方案分析
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 2017-12-19 DOI: 10.1504/IJSCCPS.2017.10009739
I. Saini, Phool Singh, A. K. Yadav
{"title":"Analysis of Lorenz-chaos and exclusive-OR based image encryption scheme","authors":"I. Saini, Phool Singh, A. K. Yadav","doi":"10.1504/IJSCCPS.2017.10009739","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2017.10009739","url":null,"abstract":"In this paper, analysis of Lorenz-chaos and exclusive-OR based image encryption scheme has been presented. The Lorenz system is used in shuffling the positions of image pixels in the spatial-domain and gray values of pixels are altered with exclusive-OR operation. The encryption scheme has been validated for grayscale images using MATLAB 7.14 and is sensitive to the encryption parameters of the Lorenz system. The experimental results establish that the key-space is large enough to resist brute-force attack, and demonstrate the scheme's resistance to noise and occlusion attacks. Statistical and correlation analysis of adjacent pixels are also performed.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121753281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信