DeepProfile: Finding fake profile in online social network using dynamic CNN

P Wanda, HJ Jie - Journal of Information Security and Applications, 2020 - Elsevier
Abstract Online Social Networks (OSN) are popular applications for sharing various data,
including text, photos, and videos. However, fake account problems are one of the obstacles …

Information and knowledge leakage in supply chain

KH Tan, WP Wong, L Chung - Information Systems Frontiers, 2016 - Springer
The current world of post industrial value generation sees companies increasingly analyzing
their internal operations against their external organizations to identify supply/demand …

DeepFriend: finding abnormal nodes in online social networks using dynamic deep learning

P Wanda, HJ Jie - Social Network Analysis and Mining, 2021 - Springer
Abstract Detection of Online Social Networks (OSN) anomalous nodes becomes
increasingly essential to identify malicious activities. The abnormal nodes suspiciously …

Analysis of the adoption of security headers in HTTP

WJ Buchanan, S Helme… - IET Information Security, 2018 - Wiley Online Library
With the increase in the number of threats within web‐based systems, a more integrated
approach is required to ensure the enforcement of security policies from the server to the …

Isma: Intelligent sensing model for anomalies detection in cross platform osns with a case study on iot

V Sharma, I You, R Kumar - IEEE Access, 2017 - ieeexplore.ieee.org
In the recent years, the user activities over online social networks (OSNs) have increased
tremendously. A large number of users share information across the different social …

Fully homomorphic encryption: Cryptography's holy grail

DJ Wu - XRDS: Crossroads, The ACM Magazine for Students, 2015 - dl.acm.org
For more than 30 years, cryptographers have embarked on a quest to construct an
encryption scheme that would enable arbitrary computation on encrypted data. Conceptually …

Data Leakage Prevention and Detection in Digital Configurations: А Survey

S Syarova, S Toleva-Stoimenova, A Kirkov… - … . Proceedings of the …, 2024 - journals.ru.lv
As a result of the development of information and communication technologies (ICT) and
Internet electronic interaction at all levels in the organizations and the use of various …

Modelling blockchain technology adoption in the supply chain: evidence from an emerging country

A Vafaei-Zadeh, AE Rastan… - International …, 2024 - inderscienceonline.com
The study aims to investigate the factors influencing the supply chain professionals' intention
to use blockchain technology, using the technology readiness index (TRI) and technology …

Cryptography across industry sectors

WJ Buchanan, A Woodward… - Journal of Cyber Security …, 2017 - Taylor & Francis
Security adoption varies across industry sectors, where some companies such as Google,
Apple and Microsoft are strong advocates of the adoption of HTTPS, while other companies …

Exploring the risks to identity security and privacy in cyberspace

JRC Nurse - XRDS: Crossroads, The ACM Magazine for Students, 2015 - dl.acm.org
Exploring the Risks to Identity Security and Privacy in Cyberspace Page 1 XRDS • SPRING
2015 • VOL.21 • NO.3 42 feature Im a g eb y M a x U s e r / S h u tte rs to c k .c o m Exploring …