Account verification to prevent malicious users access in web-based forums
This project aims to address the issue of malicious accounts that are created and used to imitate real users in web-based forums. In fact, form bots are used to create fake users on forums for several purposes. As a result hundreds of fake users start appearing in the forums and normally placing spa...
| Main Author: | Tabar, Mahdi Taheri |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/36699/1/MahdiTaheriTabarMFSKSM2013.pdf |
Similar Items
Alogrithm to prevent and detect insider multi transaction malicious activity in database
by: Khavidaki, Seyyed Mojtaba Dashti
Published: (2013)
by: Khavidaki, Seyyed Mojtaba Dashti
Published: (2013)
Enhanced lexicon based models for extracting question-answer pairs from web forum
by: Obasa, Adekunle Isiaka
Published: (2016)
by: Obasa, Adekunle Isiaka
Published: (2016)
Hybrid web page prediction model for predicting user's next access
by: Chimphlee, Siriporn
Published: (2011)
by: Chimphlee, Siriporn
Published: (2011)
Supervised machine learning approach for detection of malicious executables
by: Ahmed, Yahye Abukar
Published: (2013)
by: Ahmed, Yahye Abukar
Published: (2013)
Algorithm to prevent and detect insider multi transaction malicious activity in database
by: Dashti Khavidaki, Seyyed Mojtaba
Published: (2013)
by: Dashti Khavidaki, Seyyed Mojtaba
Published: (2013)
Detecting and preventing unauthorised computer access on a physical network system
by: Mohd. Shariff, Muhammad Reza
Published: (2008)
by: Mohd. Shariff, Muhammad Reza
Published: (2008)
Online forum thread retrieval using data fusion
by: Abdullah Albahem, Ameer Tawfik
Published: (2013)
by: Abdullah Albahem, Ameer Tawfik
Published: (2013)
Credential purpose-based access control for personal data protection in web-based applications
by: Abdul Ghani, Norjihan
Published: (2013)
by: Abdul Ghani, Norjihan
Published: (2013)
Development of an access control model for web services applying XML-based approach
by: Movahednejad, Homa
Published: (2009)
by: Movahednejad, Homa
Published: (2009)
Detection and prevention of malicious of relational database management systems (RDBMS)
by: Mohammed Rashad Aldhoqm, Arafat
Published: (2013)
by: Mohammed Rashad Aldhoqm, Arafat
Published: (2013)
An artificial co-stimulation classifier for malicious API calls classification in portable executable malwares / Saman Mirza Abdulla
by: Abdulla, Saman Mirza
Published: (2012)
by: Abdulla, Saman Mirza
Published: (2012)
Online signature verification based on dynamic feature discriminators
by: Omar, Nazaruddin
Published: (2009)
by: Omar, Nazaruddin
Published: (2009)
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018)
by: Detar , Beqo
Published: (2018)
Stroke-to-stroke matching in on-line signature verification
by: Ahmad Jaini, Azhar
Published: (2010)
by: Ahmad Jaini, Azhar
Published: (2010)
User value co-creation model for agile web development in Malaysia
by: Madi, Tameer
Published: (2015)
by: Madi, Tameer
Published: (2015)
Two-dimensional barcodes for hardcopy document integrity verification
by: Teoh, Chin Yew
Published: (2008)
by: Teoh, Chin Yew
Published: (2008)
Modeling activity diagram to colored petri net for validation and verification based on non functional parameters
by: Balagatabi, Hossein Nematzadeh
Published: (2008)
by: Balagatabi, Hossein Nematzadeh
Published: (2008)
An analysis on security awareness of social networks users
by: Darvishi, Mahdi
Published: (2013)
by: Darvishi, Mahdi
Published: (2013)
Online signature verification using probabilistic modeling and neural network
by: Mohamed Ahsan , Amin
Published: (2010)
by: Mohamed Ahsan , Amin
Published: (2010)
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
by: Nageswary , Gannapathy
Published: (2002)
by: Nageswary , Gannapathy
Published: (2002)
Modelling UML activity diagram to colored petri net for validation and verification based on non functional parameters
by: Balagatabi, Hossein Nematzadeh
Published: (2008)
by: Balagatabi, Hossein Nematzadeh
Published: (2008)
Offline signature verification using ordinal structure fuzzy logic and integrated features based on single signature
by: Abdulfattah, Ghassan Marwan
Published: (2019)
by: Abdulfattah, Ghassan Marwan
Published: (2019)
A model for validation and verification of disk imaging in computer forensic investigation
by: Palaniappan, P. Siva Shamala
Published: (2009)
by: Palaniappan, P. Siva Shamala
Published: (2009)
Collaborative-based decision making for web service composition using service level agreement negotiation and crowdsourcing
by: Sharifi, Mahdi
Published: (2015)
by: Sharifi, Mahdi
Published: (2015)
The underutilization factors of computerised accounting software among accountants
by: Nur Fatiha Na’aimah, Mohd Fauzi
Published: (2022)
by: Nur Fatiha Na’aimah, Mohd Fauzi
Published: (2022)
Fusion features ensembling models using Siamese convolutional neural network for kinship verification
by: Mohammed Ali, Al Muashi
Published: (2021)
by: Mohammed Ali, Al Muashi
Published: (2021)
Trusted reasoning-role-based access control for cloud computing environment
by: Abdul Rauf, Abdul Rauf
Published: (2019)
by: Abdul Rauf, Abdul Rauf
Published: (2019)
Hybrid features for detection of malicious user in YouTube
by: Sadoon, Omar Hadeb
Published: (2017)
by: Sadoon, Omar Hadeb
Published: (2017)
On the prevention of Cross-VM cache-based side channel attacks / Zakira Inayat
by: Zakira, Inayat
Published: (2017)
by: Zakira, Inayat
Published: (2017)
Web design attributes guideline to reinforce user trust, satisfaction, and loyalty for Malaysian university students / Ranjen Naidu Vasudiven
by: Ranjen Naidu , Vasudiven
Published: (2021)
by: Ranjen Naidu , Vasudiven
Published: (2021)
Web-Based Youth Forum Application (WBYFA)
by: Alksher, Mostafa Ahmed
Published: (2008)
by: Alksher, Mostafa Ahmed
Published: (2008)
OffSig-sinGAN: A deep learning-based image augmentation model for offline signature verification / Muhammad Muzaffar Hameed
by: Muhammad Muzaffar , Hameed
Published: (2023)
by: Muhammad Muzaffar , Hameed
Published: (2023)
Partial Verification Bias Correction In Diagnostic Accuracy Studies Using Propensity Score-Based Methods
by: Wan Mansor, Wan Nor Arifin
Published: (2023)
by: Wan Mansor, Wan Nor Arifin
Published: (2023)
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
by: Al-Zarqawee, Aws Naser
Published: (2018)
by: Al-Zarqawee, Aws Naser
Published: (2018)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Prioritization-based adaptive emergency traffic medium access control protocol for wireless body area networks
by: Masud, Farhan
Published: (2019)
by: Masud, Farhan
Published: (2019)
Web Based Students' Attendance System (WSAS)
by: Al-Dmour, Ala Abdal-Gader Nemran
Published: (2012)
by: Al-Dmour, Ala Abdal-Gader Nemran
Published: (2012)
Web-based counselling system / Suvarna Supramaniam
by: Suvarna , Supramaniam
Published: (2002)
by: Suvarna , Supramaniam
Published: (2002)
Development of a Web Access Control Technique Based User Access Behavior
by: Abdelrahman, Selmaelsheikh
Published: (2004)
by: Abdelrahman, Selmaelsheikh
Published: (2004)
E-Accounting System / Gan Chaur Chan
by: Gan, Chaur Chan
Published: (2003)
by: Gan, Chaur Chan
Published: (2003)
Similar Items
-
Alogrithm to prevent and detect insider multi transaction malicious activity in database
by: Khavidaki, Seyyed Mojtaba Dashti
Published: (2013) -
Enhanced lexicon based models for extracting question-answer pairs from web forum
by: Obasa, Adekunle Isiaka
Published: (2016) -
Hybrid web page prediction model for predicting user's next access
by: Chimphlee, Siriporn
Published: (2011) -
Supervised machine learning approach for detection of malicious executables
by: Ahmed, Yahye Abukar
Published: (2013) -
Algorithm to prevent and detect insider multi transaction malicious activity in database
by: Dashti Khavidaki, Seyyed Mojtaba
Published: (2013)