531 research outputs found

    Social spammer detection: A multi-relational embedding approach

    Full text link
    © Springer International Publishing AG, part of Springer Nature 2018. Since the relation is the main data shape of social networks, social spammer detection desperately needs a relation-dependent but content-independent framework. Some recent detection method transforms the social relations into a set of topological features, such as degree, k-core, etc. However, the multiple heterogeneous relations and the direction within each relation have not been fully explored for identifying social spammers. In this paper, we make an attempt to adopt the Multi-Relational Embedding (MRE) approach for learning latent features of the social network. The MRE model is able to fuse multiple kinds of different relations and also learn two latent vectors for each relation indicating both sending role and receiving role of every user, respectively. Experimental results on a real-world multi-relational social network demonstrate the latent features extracted by our MRE model can improve the detection performance remarkably

    On the mark? Responses to a sting

    Get PDF
    A series of responses to John Bohannon's "sting" operation on OA journals

    Marketing Privacy: A Solution for the Blight of Telemarketing (and Spam and Junk Mail)

    Get PDF
    Unsolicited solicitations in the form of telemarketing calls, email spam and junk mail impose in aggregate a substantial negative externality on society. Telemarketers do not bear the full costs of their marketing because they do not compensate recipients for the hassle of, say, being interrupted during dinner. Current regulatory responses that give consumers the all-or-nothing option of registering on the Internet to block all unsolicited telemarketing calls are needlessly both over- and underinclusive. A better solution is to allow individual consumers to choose the price per minute they would like to receive as compensation for listening to telemarketing calls. Such a name your own price mechanism could be easily implemented technologically by crediting consumers\u27 phone bills (a method analogous to the current debits to bills from 1-900 calls). Compensated calling is also easily implemented within current don\u27t call statutes simply by giving don\u27t-call households the option to authorize intermediaries to connect calls that meet their particular manner or compensation prerequisites. Under this rule, consumers are presumptively made better off by a regime that gives them greater freedom. Telemarketing firms facing higher costs of communication are likely to better screen potential contacts. Consumers having the option of choosing an intermediate price will receive fewer calls, which will be better tailored to their interests, and will be compensated for those calls they do receive. Giving consumers the right to be compensated may also benefit some telemarketers. Once consumers are voluntarily opting to receive telemarketing calls (in return for tailored compensation), it becomes possible to deregulate the telemarketers—lifting current restrictions on the time (no night time calls) and manner (no recorded calls). And faced with increasing caller resistance, we imagine that survey groups, such as the Gallop Poll, might welcome the opportunity to compensate survey respondents so that they might be able to produce more representative samples

    What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Credentials In The Wild

    Get PDF
    Cybercriminals steal access credentials to online accounts and then misuse them for their own profit, release them publicly, or sell them on the underground market. Despite the importance of this problem, the research community still lacks a comprehensive understanding of what these stolen accounts are used for. In this paper, we aim to shed light on the modus operandi of miscreants accessing stolen Gmail accounts. We developed an infrastructure that is able to monitor the activity performed by users on Gmail accounts, and leaked credentials to 100 accounts under our control through various means, such as having information-stealing malware capture them, leaking them on public paste sites, and posting them on underground forums. We then monitored the activity recorded on these accounts over a period of 7 months. Our observations allowed us to devise a taxonomy of malicious activity performed on stolen Gmail accounts, to identify differences in the behavior of cybercriminals that get access to stolen accounts through different means, and to identify systematic attempts to evade the protection systems in place at Gmail and blend in with the legitimate user activity. This paper gives the research community a better understanding of a so far understudied, yet critical aspect of the cybercrime economy

    Adversarial behaviours knowledge area

    Full text link
    The technological advancements witnessed by our society in recent decades have brought improvements in our quality of life, but they have also created a number of opportunities for attackers to cause harm. Before the Internet revolution, most crime and malicious activity generally required a victim and a perpetrator to come into physical contact, and this limited the reach that malicious parties had. Technology has removed the need for physical contact to perform many types of crime, and now attackers can reach victims anywhere in the world, as long as they are connected to the Internet. This has revolutionised the characteristics of crime and warfare, allowing operations that would not have been possible before. In this document, we provide an overview of the malicious operations that are happening on the Internet today. We first provide a taxonomy of malicious activities based on the attacker’s motivations and capabilities, and then move on to the technological and human elements that adversaries require to run a successful operation. We then discuss a number of frameworks that have been proposed to model malicious operations. Since adversarial behaviours are not a purely technical topic, we draw from research in a number of fields (computer science, criminology, war studies). While doing this, we discuss how these frameworks can be used by researchers and practitioners to develop effective mitigations against malicious online operations.Published versio

    Trivia Questions & Answers

    Get PDF

    Ipsographing the Dubject; or, The Contradictions of Twitter

    Get PDF
    Precise control of self-renewal and differentiation of progenitor cells into the cranial neural crest (CNC) pool ensures proper head development, guided by signaling pathways such as BMPs, FGFs, Shh and Notch. Here, we show that murine Sox2 plays an essential role in controlling progenitor cell behavior during craniofacial development. A "Conditional by Inversion" Sox2 allele (Sox2(COIN) ) has been employed to generate an epiblast ablation of Sox2 function (Sox2(EpINV) ). Sox2 (EpINV/+(H)) haploinsufficient and conditional (Sox2(EpINV/mosaic) ) mutant embryos proceed beyond gastrulation and die around E11. These mutant embryos exhibit severe anterior malformations, with hydrocephaly and frontonasal truncations, which could be attributed to the deregulation of CNC progenitor cells during their epithelial to mesenchymal transition. This irregularity results in an exacerbated and aberrant migration of Sox10(+) NCC in the branchial arches and frontonasal process of the Sox2 mutant embryos. These results suggest a novel role for Sox2 as a regulator of the epithelial to mesenchymal transitions (EMT) that are important for the cell flow in the developing head
    • …
    corecore