Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
Articles 1 - 5 of 5
Full-Text Articles in Physical Sciences and Mathematics
Proquest Tdm Studio: A Text And Data Mining Solution, Anamika Megwalu, Anne Marie Engelsen
Proquest Tdm Studio: A Text And Data Mining Solution, Anamika Megwalu, Anne Marie Engelsen
Faculty Research, Scholarly, and Creative Activity
TDM Studio is an integrated platform offered by ProQuest for data and text mining. TDM stands for text and data mining. This cloud-based, all-in-one innovative product is designed to offer researchers a clean interface with rights-cleared content, Jupyter notebook, and data visualization tools. As a result, researchers can now search Pro-Quest databases, create large datasets, import data to Jupyter notebook for analysis, and download results within a day.
Bootbandit: A Macos Bootloader Attack, Armen Boursalian, Mark Stamp
Bootbandit: A Macos Bootloader Attack, Armen Boursalian, Mark Stamp
Faculty Publications, Computer Science
Historically, the boot phase on personal computers left systems in a relatively vulnerable state. Because traditional antivirus software runs within the operating system, the boot environment is difficult to protect from malware. Examples of attacks against bootloaders include so‐called “evil maid” attacks, in which an intruder physically obtains a boot disk to install malicious software for obtaining the password used to encrypt a disk. The password then must be stored and retrieved again through physical access. In this paper, we discuss an attack that borrows concepts from the evil maid. We assume exploitation can be used to infect a bootloader …
Support Vector Machines For Image Spam Analysis, Aneri Chavda, Katerina Potika, Fabio Di Troia, Mark Stamp
Support Vector Machines For Image Spam Analysis, Aneri Chavda, Katerina Potika, Fabio Di Troia, Mark Stamp
Faculty Publications, Computer Science
Email is one of the most common forms of digital communication. Spam is unsolicited bulk email, while image spam consists of spam text embedded inside an image. Image spam is used as a means to evade text-based spam filters, and hence image spam poses a threat to email-based communication. In this research, we analyze image spam detection using support vector machines (SVMs), which we train on a wide variety of image features. We use a linear SVM to quantify the relative importance of the features under consideration. We also develop and analyze a realistic “challenge” dataset that illustrates the limitations …
A Trust-Aware System For Personalized User Recommendations In Social Networks, Magdalini Eirinaki, Malamati Louta, Iraklis Varlamis
A Trust-Aware System For Personalized User Recommendations In Social Networks, Magdalini Eirinaki, Malamati Louta, Iraklis Varlamis
Faculty Publications
Social network analysis has recently gained a lot of interest because of the advent and the increasing popularity of social media, such as blogs, social networking applications, microblogging, or customer review sites. In this environment, trust is becoming an essential quality among user interactions and the recommendation for useful content and trustful users is crucial for all the members of the network. In this paper, we introduce a framework for handling trust in social networks, which is based on a reputation mechanism that captures the implicit and explicit connections between the network members, analyzes the semantics and dynamics of these …
Application Of Social Network Metrics To A Trust-Aware Collaborative Model For Generating Personalized User Recommendations, Iraklis Varlamis, Magdalini Eirinaki, Malamati Louta
Application Of Social Network Metrics To A Trust-Aware Collaborative Model For Generating Personalized User Recommendations, Iraklis Varlamis, Magdalini Eirinaki, Malamati Louta
Faculty Publications
Social network analysis has emerged as a key technique in modern sociology, but has recently gained a lot of interest in Web mining research, because of the advent and the increasing popularity of social media, such as blogs, social networks, micro-blogging, customer review sites etc. Such media often serve as platforms for information dissemination and product placement or promotion. One way to improve the quality of recommendations provided to the members of social networks is to use trustworthy resources. In this environment, community-based reputation can help estimating the trustworthiness of individual users. Consequently, influence and trust are becoming essential qualities …