[PDF][PDF] Dark web illegal activities crawling and classifying using data mining techniques

AHM Alaidi, M Roa'a, HTS ALRikabi, IA Aljazaery… - iJIM, 2022 - academia.edu
Dark web is a canopy concept that denotes any kind of illicit activities carried out by
anonymous persons or organizations, thereby making it difficult to trace. The illicit content on …

Ready-to-(ab) use: From fake account trafficking to coordinated inauthentic behavior on Twitter

M Mazza, G Cola, M Tesconi - Online Social Networks and Media, 2022 - Elsevier
Fake accounts are the primary means for misuse and abuse of social media platforms,
giving rise to coordinated inauthentic behaviors. Despite ongoing efforts to limit their …

RALF: an adaptive reinforcement learning framework for teaching dyslexic students

SAH Minoofam, A Bastanfard… - Multimedia Tools and …, 2022 - Springer
Dyslexia is a learning disorder in which individuals have significant reading difficulties.
Previous studies found that using machine learning techniques in content supplements is …

[图书][B] Seguridad de la información

EV Briceño - 2021 - books.google.com
El académico Edgar Vega Briceño es Ingeniero en Informática con un posgrado en
Administración de la Tecnología de Información y Comunicación por la Universidad …

[PDF][PDF] “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication

JH Klemmer, M Gutfleisch, C Stransky, Y Acar… - 2023 - saschafahl.de
Password-based authentication is the status quo on the web and beyond [6, 13, 14]—
despite its many known problems. This includes challenges around memorizing passwords …

[PDF][PDF] Research trends on CAPTCHA: A systematic literature

EO Igbekele, AA Adebiyi, FA Ibikunle… - International Journal of …, 2021 - core.ac.uk
The advent of technology has crept into virtually all sectors and this has culminated in
automated processes making use of the Internet in executing various tasks and actions. Web …

Challenges and opportunities for Arabic CAPTCHAs

MT Parvez, SA Alsuhibany - Multimedia Tools and Applications, 2024 - Springer
Abstract Arabic Completely Automated Public Turing test to tell Computers and Humans
Apart (CAPTCHA) has only recently gained attention, with a few studies on handwritten text …

[PDF][PDF] Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions

N Kheshaifaty, A Gutub - Int. J. Comput. Sci. Netw. Secur.(IJCSNS), 2020 - researchgate.net
Authentication is the process of verifying the identity of online computer users. It can be
confirmed using various methods such as captchas or encrypted hashed passwords to …

CAPTCHA Types and Breaking Techniques: Design Issues, Challenges, and Future Research Directions

N Tariq, FA Khan, SA Moqurrab… - arXiv preprint arXiv …, 2023 - arxiv.org
The proliferation of the Internet and mobile devices has resulted in malicious bots access to
genuine resources and data. Bots may instigate phishing, unauthorized access, denial-of …

Do human cognitive differences in information processing affect preference and performance of CAPTCHA?

M Belk, C Fidas, P Germanakos, G Samaras - International Journal of …, 2015 - Elsevier
Abstract A Completely Automated Public Turing test to tell Computers and Humans Apart
(CAPTCHA) is a widely used security defense mechanism that is utilized by service …