35 research outputs found

    STREAM-EVOLVING BOT DETECTION FRAMEWORK USING GRAPH-BASED AND FEATURE-BASED APPROACHES FOR IDENTIFYING SOCIAL BOTS ON TWITTER

    Get PDF
    This dissertation focuses on the problem of evolving social bots in online social networks, particularly Twitter. Such accounts spread misinformation and inflate social network content to mislead the masses. The main objective of this dissertation is to propose a stream-based evolving bot detection framework (SEBD), which was constructed using both graph- and feature-based models. It was built using Python, a real-time streaming engine (Apache Kafka version 3.2), and our pretrained model (bot multi-view graph attention network (Bot-MGAT)). The feature-based model was used to identify predictive features for bot detection and evaluate the SEBD predictions. The graph-based model was used to facilitate multiview graph attention networks (GATs) with fellowship links to build our framework for predicting account labels from streams. A probably approximately correct learning framework was applied to confirm the accuracy and confidence levels of SEBD.The results showed that the SEBD can effectively identify bots from streams and profile features are sufficient for detecting social bots. The pretrained Bot-MGAT model uses fellowship links to reveal hidden information that can aid in identifying bot accounts. The significant contributions of this study are the development of a stream based bot detection framework for detecting social bots based on a given hashtag and the proposal of a hybrid approach for feature selection to identify predictive features for identifying bot accounts. Our findings indicate that Twitter has a higher percentage of active bots than humans in hashtags. The results indicated that stream-based detection is more effective than offline detection by achieving accuracy score 96.9%. Finally, semi supervised learning (SSL) can solve the issue of labeled data in bot detection tasks

    IEOM Society International

    Get PDF
    IEOM Society Internationa

    IoT Health Devices: Exploring Security Risks in the Connected Landscape

    Get PDF
    The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of attacks are possible. To understand the risks in this new landscape, it is important to understand the architecture of IoTHDs, operations, and the social dynamics that may govern their interactions. This paper aims to document and create a map regarding IoTHDs, lay the groundwork for better understanding security risks in emerging IoTHD modalities through a multi-layer approach, and suggest means for improved governance and interaction. We also discuss technological innovations expected to set the stage for novel exploits leading into the middle and latter parts of the 21st century

    Development of an efficient Ad Hoc broadcasting scheme for critical networking environments

    Get PDF
    Mobile ad hoc network has been widely deployed in support of the communications in hostile environment without conventional networking infrastructure, especially in the environments with critical conditions such as emergency rescue activities in burning building or earth quick evacuation. However, most of the existing ad hoc based broadcasting schemes either rely on GPS location or topology information or angle-of-arrival (AoA) calculation or combination of some or all to achieve high reachability. Therefore, these broadcasting schemes cannot be directly used in critical environments such as battlefield, sensor networks and natural disasters due to lack of node location and topology information in such critical environments. This research work first begins by analyzing the broadcast coverage problem and node displacement form ideal locations problem in ad hoc networks using theoretical analysis. Then, this research work proposes an efficient broadcast relaying scheme, called Random Directional Broadcasting Relay (RDBR), which greatly reduces the number of retransmitting nodes and end-to-end delay while achieving high reachability. This is done by selecting a subset of neighboring nodes to relay the packet using directional antennas without relying on node location, network topology and complex angle-of-arrival (AoA) calculations. To further improve the performance of the RDBR scheme in complex environments with high node density, high node mobility and high traffic rate, an improved RDBR scheme is proposed. The improved RDBR scheme utilizes the concept of gaps between neighboring sectors to minimize the overlap between selected relaying nodes in high density environments. The concept of gaps greatly reduces both contention and collision and at the same time achieves high reachability. The performance of the proposed RDBR schemes has been evaluated by comparing them against flooding and Distance-based schemes. Simulation results show that both proposed RDBR schemes achieve high reachability while reducing the number of retransmitting nodes and end-to-end delay especially in high density environments. Furthermore, the improved RDBR scheme achieves better performance than RDBR in high density and high traffic environment in terms of reachability, end-to-end delay and the number of retransmitting nodes

    Impact of New Method for Laying Separate Sewer System on Pavement Layers

    Get PDF
    The method of installing underground infrastructure has a significant influence on road resistance and performance under live loads such as traffic. This research presents a new method for laying separate sewer systems by using one trench to sit both sanitary pipe and storm pipe and considers the effects of this approach on the pavement strength. Experimental tests have been conducted in the laboratory using a trench 2.5x0.45x1 metre to install two pipes one over the other (sanitary pipe in the bottom and storm pipe on top). Two cases have tested, the first case using 5 cm surface layer of cold mix asphalt while the second is using soil. A series of loads were applied to test the behaviour of this new system and its effects on the pavement surface layer and the buried pipe. The comparison between the rut print of the live load on the soil layer and the pavement layer was conducted. Results demonstrated that using the cold mix asphalt is still insufficient to provide enough safety to protect buried pipe as a reason of needing to relatively long time to acquire high stiffness. Therefore, minimum cover depth to protect pipelines still required

    Unmanned Vehicle Systems & Operations on Air, Sea, Land

    Get PDF
    Unmanned Vehicle Systems & Operations On Air, Sea, Land is our fourth textbook in a series covering the world of Unmanned Aircraft Systems (UAS) and Counter Unmanned Aircraft Systems (CUAS). (Nichols R. K., 2018) (Nichols R. K., et al., 2019) (Nichols R. , et al., 2020)The authors have expanded their purview beyond UAS / CUAS systems. Our title shows our concern for growth and unique cyber security unmanned vehicle technology and operations for unmanned vehicles in all theaters: Air, Sea and Land – especially maritime cybersecurity and China proliferation issues. Topics include: Information Advances, Remote ID, and Extreme Persistence ISR; Unmanned Aerial Vehicles & How They Can Augment Mesonet Weather Tower Data Collection; Tour de Drones for the Discerning Palate; Underwater Autonomous Navigation & other UUV Advances; Autonomous Maritime Asymmetric Systems; UUV Integrated Autonomous Missions & Drone Management; Principles of Naval Architecture Applied to UUV’s; Unmanned Logistics Operating Safely and Efficiently Across Multiple Domains; Chinese Advances in Stealth UAV Penetration Path Planning in Combat Environment; UAS, the Fourth Amendment and Privacy; UV & Disinformation / Misinformation Channels; Chinese UAS Proliferation along New Silk Road Sea / Land Routes; Automaton, AI, Law, Ethics, Crossing the Machine – Human Barrier and Maritime Cybersecurity.Unmanned Vehicle Systems are an integral part of the US national critical infrastructure The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. Unmanned Vehicle (UV) Systems & Operations On Air, Sea, Land discusses state-of-the-art technology / issues facing U.S. UV system researchers / designers / manufacturers / testers. We trust our newest look at Unmanned Vehicles in Air, Sea, and Land will enrich our students and readers understanding of the purview of this wonderful technology we call UV.https://newprairiepress.org/ebooks/1035/thumbnail.jp

    Factors Influencing Customer Satisfaction towards E-shopping in Malaysia

    Get PDF
    Online shopping or e-shopping has changed the world of business and quite a few people have decided to work with these features. What their primary concerns precisely and the responses from the globalisation are the competency of incorporation while doing their businesses. E-shopping has also increased substantially in Malaysia in recent years. The rapid increase in the e-commerce industry in Malaysia has created the demand to emphasize on how to increase customer satisfaction while operating in the e-retailing environment. It is very important that customers are satisfied with the website, or else, they would not return. Therefore, a crucial fact to look into is that companies must ensure that their customers are satisfied with their purchases that are really essential from the ecommerce’s point of view. With is in mind, this study aimed at investigating customer satisfaction towards e-shopping in Malaysia. A total of 400 questionnaires were distributed among students randomly selected from various public and private universities located within Klang valley area. Total 369 questionnaires were returned, out of which 341 questionnaires were found usable for further analysis. Finally, SEM was employed to test the hypotheses. This study found that customer satisfaction towards e-shopping in Malaysia is to a great extent influenced by ease of use, trust, design of the website, online security and e-service quality. Finally, recommendations and future study direction is provided. Keywords: E-shopping, Customer satisfaction, Trust, Online security, E-service quality, Malaysia

    Volume II Acquisition Research Creating Synergy for Informed Change, Thursday 19th Annual Acquisition Research Proceedings

    Get PDF
    ProceedingsApproved for public release; distribution is unlimited

    IKUWA6. Shared Heritage

    Get PDF
    Celebrating the theme ‘Shared heritage’, IKUWA6 (the 6th International Congress for Underwater Archaeology), was the first such major conference to be held in the Asia-Pacific region, and the first IKUWA meeting hosted outside Europe since the organisation’s inception in Germany in the 1990s. A primary objective of holding IKUWA6 in Australia was to give greater voice to practitioners and emerging researchers across the Asia and Pacific regions who are often not well represented in northern hemisphere scientific gatherings of this scale; and, to focus on the areas of overlap in our mutual heritage, techniques and technology. Drawing together peer-reviewed presentations by delegates from across the world who converged in Fremantle in 2016 to participate, this volume covers a stimulating diversity of themes and niche topics of value to maritime archaeology practitioners, researchers, students, historians and museum professionals across the world
    corecore