1,797 research outputs found
Profiling Users by Modeling Web Transactions
Users of electronic devices, e.g., laptop, smartphone, etc. have
characteristic behaviors while surfing the Web. Profiling this behavior can
help identify the person using a given device. In this paper, we introduce a
technique to profile users based on their web transactions. We compute several
features extracted from a sequence of web transactions and use them with
one-class classification techniques to profile a user. We assess the efficacy
and speed of our method at differentiating 25 users on a dataset representing 6
months of web traffic monitoring from a small company network.Comment: Extended technical report of an IEEE ICDCS 2017 publicatio
Comover Enhancement of Quarkonium Production
Quarkonium data suggest an enhancement of the hadroproduction rate from
interactions of the heavy quark pair with a comoving color field generated in
the hard gg -> Q\bar{Q} subprocess. We review the motivations and principal
consequences of this comover enhancement scenario (CES).Comment: 7 pages, 1 eps figure, to appear in the proceedings of the CERN
2001-2002 workshop `Hard Probes in Heavy Ion Collisions at the LHC
Criteria for and extrapolation in overstress models
Accelerated life test models, criteria for model selection, and extrapolation in overstress model
The paradox of poor representation: How voterâparty incongruence curbs affective polarisation
Research on the relationship between ideology and affective polarisation highlights ideological disagreement as a key driver of animosity between partisan groups. By operationalising disagreement on the leftâright dimension, however, existing studies often overlook voterâparty incongruence as a potential determinant of affective evaluations. How does incongruence on policy issues impact affective evaluations of mainstream political parties and their leaders? We tackle this question by analysing data from the British Election Study collected ahead of the 2019 UK General Election using an instrumental variable approach. Consistent with our expectations, we find that voterâparty incongruence has a significant causal impact on affective evaluations. Perceived representational gaps between party and voter drive negative evaluations of the in-party and positive evaluations of the opposition, thus lowering affective polarisation overall. The results offer a more nuanced perspective on the role of ideological conflict in driving affective polarisation
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT
With the rapid growth of the Internet-of-Things (IoT), concerns about the
security of IoT devices have become prominent. Several vendors are producing
IP-connected devices for home and small office networks that often suffer from
flawed security designs and implementations. They also tend to lack mechanisms
for firmware updates or patches that can help eliminate security
vulnerabilities. Securing networks where the presence of such vulnerable
devices is given, requires a brownfield approach: applying necessary protection
measures within the network so that potentially vulnerable devices can coexist
without endangering the security of other devices in the same network. In this
paper, we present IOT SENTINEL, a system capable of automatically identifying
the types of devices being connected to an IoT network and enabling enforcement
of rules for constraining the communications of vulnerable devices so as to
minimize damage resulting from their compromise. We show that IOT SENTINEL is
effective in identifying device types and has minimal performance overhead
Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets
Phishing is a major problem on the Web. Despite the significant attention it has received over the years, there has been no definitive solution. While the state-of-the-art solutions have reasonably good performance, they require a large amount of training data and are not adept at detecting phishing attacks against new targets. In this paper, we begin with two core observations: (a) although phishers try to make a phishing webpage look similar to its target, they do not have unlimited freedom in structuring the phishing webpage, and (b) a webpage can be characterized by a small set of key terms, how these key terms are used in different parts of a webpage is different in the case of legitimate and phishing webpages. Based on these observations, we develop a phishing detection system with several notable properties: it requires very little training data, scales well to much larger test data, is language-independent, fast, resilient to adaptive attacks and implemented entirely on client-side. In addition, we developed a target identification component that can identify the target website that a phishing webpage is attempting to mimic. The target detection component is faster than previously reported systems and can help minimize false positives in our phishing detection system.Peer reviewe
How Do Individuals in a Radical Echo Chamber React to Opposing Views? Evidence from a Content Analysis of Stormfront
Calls to âbreak upâ radical echo chambers by injecting them with alternative viewpoints are common. Yet, thus far there is little evidence about the impact of such counter-messaging. To what extent and how do individuals who inhabit a radical echo chamber engage with messages that challenge their core beliefs? Drawing on data from the radical right forum Stormfront we address this question with a large-scale content and longitudinal analysis of usersâ posting behavior, which analyses more than 35,000 English language contributions to the forum spanning 2011 through 2013. Our findings show that engaging with oppositional views is actually a core practice among Stromfront users which invites active participation and encourages engagement. Indeed, many âechoesâ in the echo chamber we studied were not core beliefs being restated, but the sound of opposing viewpoints being undermined and marginalized. These findings underscore the limited potential for counter-messages to undermine radical echo chambers
- âŠ