The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
People are highly dependent on online social networks (OSNs) which have attracted the interest of cyber criminals for carrying out a number of malicious activities. An entire industry of black-market services has emerged which offers fake accounts based services for sale. We, therefore, in our work, focus on detecting fake accounts on a very popular (and difficult for data collection) online social...
Lately, there has been a growing trend in the Internet space particularly among the Online Social Media (OSMs) platforms like Twitter, Facebook etc which are becoming huge repositories of information. This information, by design, is posted by users of these websites and consequently, this information is vast, un-organized, unreliable and dynamic. It is commonly observed that along with genuine users,...
BotNet is a network based attack that has emerged as a serious threat to Internet community and has been a common weapon for committing cybercrimes such as spam generation, stealing sensitive information, click fraud and DDOS attacks. Botnet is a network of hosts remotely controlled and coordinated under a common command and control infrastructure. P2P BotNets represent a recent and most challenging...
Network administrators ensure that all the users within network get fair share of bandwidth, any bandwidth limit violations is identified and provide some additional controls like denied access to particular websites, etc. To achieve this, network administrators monitor all the traffic between the LAN in campus-wide network and the outside Internet world. This monitoring is typically achieved by capturing...
Online social media websites like Twitter has become one of the most popular platforms for people to obtain or spread information. However, in absence of any moderation and use of crowd sourcing, there is no guarantee that the information shared is credible or not. This makes online social media highly susceptible to the spread of rumors. As part of our work, we investigate in retrospect a dataset...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.