1,794 research outputs found

    Profiling Users by Modeling Web Transactions

    Full text link
    Users of electronic devices, e.g., laptop, smartphone, etc. have characteristic behaviors while surfing the Web. Profiling this behavior can help identify the person using a given device. In this paper, we introduce a technique to profile users based on their web transactions. We compute several features extracted from a sequence of web transactions and use them with one-class classification techniques to profile a user. We assess the efficacy and speed of our method at differentiating 25 users on a dataset representing 6 months of web traffic monitoring from a small company network.Comment: Extended technical report of an IEEE ICDCS 2017 publicatio

    Comover Enhancement of Quarkonium Production

    Get PDF
    Quarkonium data suggest an enhancement of the hadroproduction rate from interactions of the heavy quark pair with a comoving color field generated in the hard gg -> Q\bar{Q} subprocess. We review the motivations and principal consequences of this comover enhancement scenario (CES).Comment: 7 pages, 1 eps figure, to appear in the proceedings of the CERN 2001-2002 workshop `Hard Probes in Heavy Ion Collisions at the LHC

    Criteria for and extrapolation in overstress models

    Get PDF
    Accelerated life test models, criteria for model selection, and extrapolation in overstress model

    The paradox of poor representation: How voter–party incongruence curbs affective polarisation

    Get PDF
    Research on the relationship between ideology and affective polarisation highlights ideological disagreement as a key driver of animosity between partisan groups. By operationalising disagreement on the left–right dimension, however, existing studies often overlook voter–party incongruence as a potential determinant of affective evaluations. How does incongruence on policy issues impact affective evaluations of mainstream political parties and their leaders? We tackle this question by analysing data from the British Election Study collected ahead of the 2019 UK General Election using an instrumental variable approach. Consistent with our expectations, we find that voter–party incongruence has a significant causal impact on affective evaluations. Perceived representational gaps between party and voter drive negative evaluations of the in-party and positive evaluations of the opposition, thus lowering affective polarisation overall. The results offer a more nuanced perspective on the role of ideological conflict in driving affective polarisation

    IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

    Full text link
    With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs and implementations. They also tend to lack mechanisms for firmware updates or patches that can help eliminate security vulnerabilities. Securing networks where the presence of such vulnerable devices is given, requires a brownfield approach: applying necessary protection measures within the network so that potentially vulnerable devices can coexist without endangering the security of other devices in the same network. In this paper, we present IOT SENTINEL, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise. We show that IOT SENTINEL is effective in identifying device types and has minimal performance overhead

    Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets

    Get PDF
    Phishing is a major problem on the Web. Despite the significant attention it has received over the years, there has been no definitive solution. While the state-of-the-art solutions have reasonably good performance, they require a large amount of training data and are not adept at detecting phishing attacks against new targets. In this paper, we begin with two core observations: (a) although phishers try to make a phishing webpage look similar to its target, they do not have unlimited freedom in structuring the phishing webpage, and (b) a webpage can be characterized by a small set of key terms, how these key terms are used in different parts of a webpage is different in the case of legitimate and phishing webpages. Based on these observations, we develop a phishing detection system with several notable properties: it requires very little training data, scales well to much larger test data, is language-independent, fast, resilient to adaptive attacks and implemented entirely on client-side. In addition, we developed a target identification component that can identify the target website that a phishing webpage is attempting to mimic. The target detection component is faster than previously reported systems and can help minimize false positives in our phishing detection system.Peer reviewe

    How Do Individuals in a Radical Echo Chamber React to Opposing Views? Evidence from a Content Analysis of Stormfront

    Get PDF
    Calls to “break up” radical echo chambers by injecting them with alternative viewpoints are common. Yet, thus far there is little evidence about the impact of such counter-messaging. To what extent and how do individuals who inhabit a radical echo chamber engage with messages that challenge their core beliefs? Drawing on data from the radical right forum Stormfront we address this question with a large-scale content and longitudinal analysis of users’ posting behavior, which analyses more than 35,000 English language contributions to the forum spanning 2011 through 2013. Our findings show that engaging with oppositional views is actually a core practice among Stromfront users which invites active participation and encourages engagement. Indeed, many “echoes” in the echo chamber we studied were not core beliefs being restated, but the sound of opposing viewpoints being undermined and marginalized. These findings underscore the limited potential for counter-messages to undermine radical echo chambers
    • 

    corecore