Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Proquest Tdm Studio: A Text And Data Mining Solution, Anamika Megwalu, Anne Marie Engelsen Dec 2021

Proquest Tdm Studio: A Text And Data Mining Solution, Anamika Megwalu, Anne Marie Engelsen

Faculty Research, Scholarly, and Creative Activity

TDM Studio is an integrated platform offered by ProQuest for data and text mining. TDM stands for text and data mining. This cloud-based, all-in-one innovative product is designed to offer researchers a clean interface with rights-cleared content, Jupyter notebook, and data visualization tools. As a result, researchers can now search Pro-Quest databases, create large datasets, import data to Jupyter notebook for analysis, and download results within a day.


Bootbandit: A Macos Bootloader Attack, Armen Boursalian, Mark Stamp Aug 2019

Bootbandit: A Macos Bootloader Attack, Armen Boursalian, Mark Stamp

Faculty Publications, Computer Science

Historically, the boot phase on personal computers left systems in a relatively vulnerable state. Because traditional antivirus software runs within the operating system, the boot environment is difficult to protect from malware. Examples of attacks against bootloaders include so‐called “evil maid” attacks, in which an intruder physically obtains a boot disk to install malicious software for obtaining the password used to encrypt a disk. The password then must be stored and retrieved again through physical access. In this paper, we discuss an attack that borrows concepts from the evil maid. We assume exploitation can be used to infect a bootloader …


Support Vector Machines For Image Spam Analysis, Aneri Chavda, Katerina Potika, Fabio Di Troia, Mark Stamp Jan 2018

Support Vector Machines For Image Spam Analysis, Aneri Chavda, Katerina Potika, Fabio Di Troia, Mark Stamp

Faculty Publications, Computer Science

Email is one of the most common forms of digital communication. Spam is unsolicited bulk email, while image spam consists of spam text embedded inside an image. Image spam is used as a means to evade text-based spam filters, and hence image spam poses a threat to email-based communication. In this research, we analyze image spam detection using support vector machines (SVMs), which we train on a wide variety of image features. We use a linear SVM to quantify the relative importance of the features under consideration. We also develop and analyze a realistic “challenge” dataset that illustrates the limitations …


A Trust-Aware System For Personalized User Recommendations In Social Networks, Magdalini Eirinaki, Malamati Louta, Iraklis Varlamis Apr 2014

A Trust-Aware System For Personalized User Recommendations In Social Networks, Magdalini Eirinaki, Malamati Louta, Iraklis Varlamis

Faculty Publications

Social network analysis has recently gained a lot of interest because of the advent and the increasing popularity of social media, such as blogs, social networking applications, microblogging, or customer review sites. In this environment, trust is becoming an essential quality among user interactions and the recommendation for useful content and trustful users is crucial for all the members of the network. In this paper, we introduce a framework for handling trust in social networks, which is based on a reputation mechanism that captures the implicit and explicit connections between the network members, analyzes the semantics and dynamics of these …


Application Of Social Network Metrics To A Trust-Aware Collaborative Model For Generating Personalized User Recommendations, Iraklis Varlamis, Magdalini Eirinaki, Malamati Louta Jan 2013

Application Of Social Network Metrics To A Trust-Aware Collaborative Model For Generating Personalized User Recommendations, Iraklis Varlamis, Magdalini Eirinaki, Malamati Louta

Faculty Publications

Social network analysis has emerged as a key technique in modern sociology, but has recently gained a lot of interest in Web mining research, because of the advent and the increasing popularity of social media, such as blogs, social networks, micro-blogging, customer review sites etc. Such media often serve as platforms for information dissemination and product placement or promotion. One way to improve the quality of recommendations provided to the members of social networks is to use trustworthy resources. In this environment, community-based reputation can help estimating the trustworthiness of individual users. Consequently, influence and trust are becoming essential qualities …