Analysing Twitter Data for Phishing Tweets Identification

2021 ◽  
Vol 17 (2) ◽  
pp. 96-106
Author(s):  
Falah Hassan Ali Al-Akashi

Detecting threats like adult, violent, and phishing tweets on online social networks is a crucial issue in recent years. The aim of the work is to identify phishing content from the users' perspective in real-time tweets. To outline such content comprehensively, lexicon analysis with sentiments are encapsulated to investigate tweets that yield phishing dynamic keywords, while some features and parameters are altered to optimize the performance. To support the preliminary study, the approach is rigorously designed to assemble users' opinions on completely different classes of phishing content. Each direct and indirect opinions as well as recently projected opinions are listed to characterize all sorts of phishing content. The authors use word level analysis with sentiments to build keyword blacklist lexicons. High promising results and high level of accuracy and performance are obtained experimentally if compared with the alternative algorithms.

Author(s):  
Ou Ruan ◽  
Lixiao Zhang ◽  
Yuanyuan Zhang

AbstractLocation-based services are becoming more and more popular in mobile online social networks (mOSNs) for smart cities, but users’ privacy also has aroused widespread concern, such as locations, friend sets and other private information. At present, many protocols have been proposed, but these protocols are inefficient and ignore some security risks. In the paper, we present a new location-sharing protocol, which solves two issues by using symmetric/asymmetric encryption properly. We adopt the following methods to reduce the communication and computation costs: only setting up one location server; connecting social network server and location server directly instead of through cellular towers; avoiding broadcast encryption. We introduce dummy identities to protect users’ identity privacy, and prevent location server from inferring users’ activity tracks by updating dummy identities in time. The details of security and performance analysis with related protocols show that our protocol enjoys two advantages: (1) it’s more efficient than related protocols, which greatly reduces the computation and communication costs; (2) it satisfies all security goals; however, most previous protocols only meet some security goals.


Author(s):  
Richard Stone ◽  
Minglu Wang ◽  
Thomas Schnieders ◽  
Esraa Abdelall

Human-robotic interaction system are increasingly becoming integrated into industrial, commercial and emergency service agencies. It is critical that human operators understand and trust automation when these systems support and even make important decisions. The following study focused on human-in-loop telerobotic system performing a reconnaissance operation. Twenty-four subjects were divided into groups based on level of automation (Low-Level Automation (LLA), and High-Level Automation (HLA)). Results indicated a significant difference between low and high word level of control in hit rate when permanent error occurred. In the LLA group, the type of error had a significant effect on the hit rate. In general, the high level of automation was better than the low level of automation, especially if it was more reliable, suggesting that subjects in the HLA group could rely on the automatic implementation to perform the task more effectively and more accurately.


2018 ◽  
Vol 61 (9) ◽  
pp. 2205-2214 ◽  
Author(s):  
Mili Kuruvilla-Dugdale ◽  
Claire Custer ◽  
Lindsey Heidrick ◽  
Richard Barohn ◽  
Raghav Govindarajan

Purpose This study describes a phonetic complexity-based approach for speech intelligibility and articulatory precision testing using preliminary data from talkers with amyotrophic lateral sclerosis. Method Eight talkers with amyotrophic lateral sclerosis and 8 healthy controls produced a list of 16 low and high complexity words. Sixty-four listeners judged the samples for intelligibility, and 2 trained listeners completed phoneme-level analysis to determine articulatory precision. To estimate percent intelligibility, listeners orthographically transcribed each word, and the transcriptions were scored as being either accurate or inaccurate. Percent articulatory precision was calculated based on the experienced listeners' judgments of phoneme distortions, deletions, additions, and/or substitutions for each word. Articulation errors were weighted based on the perceived impact on intelligibility to determine word-level precision. Results Between-groups differences in word intelligibility and articulatory precision were significant at lower levels of phonetic complexity as dysarthria severity increased. Specifically, more severely impaired talkers showed significant reductions in word intelligibility and precision at both complexity levels, whereas those with milder speech impairments displayed intelligibility reductions only for more complex words. Articulatory precision was less sensitive to mild dysarthria compared to speech intelligibility for the proposed complexity-based approach. Conclusions Considering phonetic complexity for dysarthria tests could result in more sensitive assessments for detecting and monitoring dysarthria progression.


2014 ◽  
pp. 451-484
Author(s):  
Rula Sayaf ◽  
Dave Clarke

Access control is one of the crucial aspects in information systems security. Authorizing access to resources is a fundamental process to limit potential privacy violations and protect users. The nature of personal data in online social networks (OSNs) requires a high-level of security and privacy protection. Recently, OSN-specific access control models (ACMs) have been proposed to address the particular structure, functionality and the underlying privacy issues of OSNs. In this survey chapter, the essential aspects of access control and review the fundamental classical ACMs are introduced. The specific OSNs features and review the main categories of OSN-specific ACMs are highlighted. Within each category, the most prominent ACMs and their underlying mechanisms that contribute enhancing privacy of OSNs are surveyed. Toward the end, more advanced issues of access control in OSNs are discussed. Throughout the discussion, different models and highlight open problems are contrasted. Based on these problems, the chapter is concluded by proposing requirements for future ACMs.


2015 ◽  
pp. 528-556
Author(s):  
István Mezgár ◽  
Sonja Grabner-Kräuter

New information and communication technologies and their integration extend possibilities for high-level human collaboration. Various groups of people can come together according to their private or business interests forming a virtual community through social networks. However, in addition to the positive effects of this technical breakthrough there are dangerous potential side effects using these high-level networked systems; the sensitive personal or business data can be misused. Therefore, privacy has an increasingly important role in social networks and is becoming a significant area related to business ethics taking into consideration the close connection between trust and privacy. The goal of this chapter is to discuss the role and relationships between trust and privacy in mobile (business) social networks and to introduce the possible types of privacy threats and countermeasures in case of online social networks. A short summary on future trends in mobile social networks is also presented.


Author(s):  
István Mezgár ◽  
Sonja Grabner-Kräuter

New information and communication technologies and their integration extend possibilities for high-level human collaboration. Various groups of people can come together according to their private or business interests forming a virtual community through social networks. However, in addition to the positive effects of this technical breakthrough there are dangerous potential side effects using these high-level networked systems; the sensitive personal or business data can be misused. Therefore, privacy has an increasingly important role in social networks and is becoming a significant area related to business ethics taking into consideration the close connection between trust and privacy. The goal of this chapter is to discuss the role and relationships between trust and privacy in mobile (business) social networks and to introduce the possible types of privacy threats and countermeasures in case of online social networks. A short summary on future trends in mobile social networks is also presented.


Author(s):  
H. J. Hadj-Amor ◽  
T. Soriano

Mechatronics is the integration of different sciences and techniques of mechanical engineering, automatic control, electronics, and informatics. The rapid evolution of the market competitors requires the reduction of development time of a product while increasing the quality and performance. It is, therefore, necessary to increase the efficiency of the design process. To meet this need, simulation and, especially, virtual prototyping have become a key technology. It is difficult to find simulation tools are able to analyze multidependent systems of different areas. However, an environment that allows a simulation integrating multidisciplinary mechatronic systems is necessary. This paper describes a method of design and simulation of mechatronic systems. First, we identify the behavior model and its associated 3D geometric model. The behavior model is seen as a dynamic hybrid system of two coupled hybrid automata (operative part and control part). Then, we present OpenMASK and OpenModelica simulators, the IEEE1516 standard HLA and work related to this distributed architecture for simulation. In a top-down approach, we present our method and experiments to integrate HLA functionalities in these simulators and to distribute the modeling elements of mechatronic systems. Also, we propose extensions to integrate real-time for interactive simulations. Finally, we apply our approach on a representative example of a mechatronic system.


Author(s):  
Isabel Schwerdtfeger

This chapter discusses the challenges high-end storage solutions will have with future demands. Due to heavy end-user demands for real-time processing of data access, this need must be addressed by high-end storage solutions. But what type of high-end storage solutions address this need and are suitable to ensure high performance write and retrieval of data in real-time from high- end storage infrastructures, including read and write access from digital archives? For this reason, this chapter reviews a few disk and tape solutions as well as combined disk- and tape storage solutions. The review on the different storage solutions does not focus on compliance of data storage management, but on available commercial high-end systems, addressing scalability and performance requirements both for online storage and archives. High level requirements aid in identifying high-end storage system features and support Extreme Scale infrastructures for the amount of data that high-end storage systems will need to manage in future.


Sign in / Sign up

Export Citation Format

Share Document