Results 81 to 90 of about 9,357 (192)
Most past work on social network link fraud detection tries to separate genuine users from fraudsters, implicitly assuming that there is only one type of fraudulent behavior. But is this assumption true?
Beutel, Alex +3 more
core +1 more source
On the Energy Source of Green Emissions in Ghost
Abstract The understanding on the formation mechanism of ghosts as a new category of transient luminous events and favorable conditions for their occurrence is limited. In this work, we examined six ground‐based observations of ghost events captured by digital SLR cameras.
Xin Huang +7 more
wiley +1 more source
El informe anual Horizon investiga, identifica y clasifica las tecnologías emergentes que los expertos que lo elaboran prevén tendrán un impacto en la enseñanza aprendizaje, la investigación y la producción creativa en el contexto educativo de la ...
Johnson, L., Levine, A., Smith, R.
core +1 more source
A Learning-Based Approach for IP Geolocation [PDF]
The ability to pinpoint the geographic location of IP hosts is compelling for applications such as on-line advertising and network attack diagnosis. While prior methods can accurately identify the location of hosts in some regions of the Internet, they produce erroneous results when the delay or topology measurement on which they are based is limited ...
Brian Eriksson +3 more
openaire +1 more source
Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi +2 more
wiley +1 more source
GRAPH VISUALIZATION OF TRACEROUTE UTILITY RESULTS FOR COMPUTER NETWORK ANALYSIS
Background. Monitoring destination reachability, path discovery, and latency analysis is essential for network performance, reliability, and security.
Ivan Danych +2 more
doaj +1 more source
BitTorrent Sync: Network Investigation Methodology
The volume of personal information and data most Internet users find themselves amassing is ever increasing and the fast pace of the modern world results in most requiring instant access to their files.
Farina, Jason +2 more
core +1 more source
A Fusion of Recommendation Techniques to Deliver Personalized Tourism Experience
Tourism is a global industry that increasingly relies on web‐based applications to provide tourists with information about destinations, routes, food, accommodation, and transport facilities. To enhance the personalized experience for tourists using these platforms, incorporating a recommendation component is essential. However, tourism recommendations
Fiaz Majeed +4 more
wiley +1 more source
Detecting and Refactoring Operational Smells within the Domain Name System
The Domain Name System (DNS) is one of the most important components of the Internet infrastructure. DNS relies on a delegation-based architecture, where resolution of names to their IP addresses requires resolving the names of the servers responsible ...
Heckel, Reiko, Radwan, Marwan
core +2 more sources
Design and Implementation of Internet Protocol Based Geolocation System
Determining the geographic location of an Internet Protocol (IP) devices based on its IP addresses is a challenging matter because of wide network topologies and many protocols used to interconnect these devices. On the other hand, the Internet Protocol
Muayad Khalil Murtadha
doaj

