655 research outputs found

    The Role of White Hat Hackers in Information Security

    Get PDF
    No abstract is available

    Spammer Detection on Online Social Networks

    Get PDF
    Twitter with its rising popularity as a micro-blogging website has inevitably attracted attention of spammers. Spammers use myriad of techniques to lure victims into clicking malicious URLs. In this thesis, we present several novel features capable of distinguishing spam accounts from legitimate accounts in real-time. The features exploit the behavioral and content entropy, bait-techniques, community-orientation, and profile characteristics of spammers. We then use supervised learning algorithms to generate models using the proposed features and show that our tool, spAmbush, can detect spammers in real-time. Our analysis reveals detection of more than 90% of spammers with less than five tweets and more than half with only a single tweet. Our feature computation has low latency and resource requirement. Our results show a 96% detection rate with only 0.01% false positive rate. We further cluster the unknown spammers to identify and understand the prevalent spam campaigns on Twitter

    Strong A1\mathbb A^1-invariance of A1\mathbb A^1-connected components of reductive algebraic groups

    Full text link
    We show that the sheaf of A1\mathbb A^1-connected components of a reductive algebraic group over a perfect field is strongly A1\mathbb A^1-invariant. As a consequence, torsors under such groups give rise to A1\mathbb A^1-fiber sequences. We also show that sections of A1\mathbb A^1-connected components of anisotropic, semisimple, simply connected algebraic groups over an arbitrary field agree with their RR-equivalence classes, thereby removing the perfectness assumption in the previously known results about the characterization of isotropy in terms of affine homotopy invariance of Nisnevich locally trivial torsors.Comment: 14 pages, comments are welcome, v3: minor changes, results are unchange
    • …
    corecore