The late detection of security threats causes a significant increase in the risk of irreparable damages and restricts any defense attempt. In this paper, we propose a sCAlable TRAffic …
When we meet a new person, we start by introducing ourselves. We share our names, and other information about our jobs, cities, family status, and so on. This is how socializing and …
G Jethava, UP Rao - Peer-to-Peer Networking and Applications, 2022 - Springer
Abstract Nowadays, Online Social Networks (OSNs) are becoming more and more popular means of communication as they are easily accessible and offer advanced features to their …
The cyber security threats from phishing emails have been growing buoyed by the capacity of their distributors to fine‐tune their trickery and defeat previously known filtering …
Finding groups from a set of interconnected nodes is a recurrent paradigm in a variety of practical problems that can be modeled as a graph, as those emerging from Social …
V Pérez-Rosas, Q Davenport, AM Dai… - Proceedings of the …, 2017 - aclanthology.org
This paper addresses the task of detecting identity deception in language. Using a novel identity deception dataset, consisting of real and portrayed identities from 600 individuals …
Before the development of information and communication technology, social connections were confined by narrow cultural borders. User-generated multimodal information, online …
Late detection of security breaches increases the risk of irreparable damages and limits any mitigation attempts. We propose a fast and accurate threat detection and prevention …
One of the most concerning drawbacks derived from the lack of supervision in online platforms is their exploitation by misbehaving users to deliver offending (toxic) messages …