Account verification to prevent malicious users access in web-based forums
This project aims to address the issue of malicious accounts that are created and used to imitate real users in web-based forums. In fact, form bots are used to create fake users on forums for several purposes. As a result hundreds of fake users start appearing in the forums and normally placing spa...
| Auteur principal: | Tabar, Mahdi Taheri |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2013
|
| Sujets: | |
| Accès en ligne: | http://eprints.utm.my/36699/1/MahdiTaheriTabarMFSKSM2013.pdf |
Documents similaires
Alogrithm to prevent and detect insider multi transaction malicious activity in database
par: Khavidaki, Seyyed Mojtaba Dashti
Publié: (2013)
par: Khavidaki, Seyyed Mojtaba Dashti
Publié: (2013)
Enhanced lexicon based models for extracting question-answer pairs from web forum
par: Obasa, Adekunle Isiaka
Publié: (2016)
par: Obasa, Adekunle Isiaka
Publié: (2016)
Hybrid web page prediction model for predicting user's next access
par: Chimphlee, Siriporn
Publié: (2011)
par: Chimphlee, Siriporn
Publié: (2011)
Supervised machine learning approach for detection of malicious executables
par: Ahmed, Yahye Abukar
Publié: (2013)
par: Ahmed, Yahye Abukar
Publié: (2013)
Algorithm to prevent and detect insider multi transaction malicious activity in database
par: Dashti Khavidaki, Seyyed Mojtaba
Publié: (2013)
par: Dashti Khavidaki, Seyyed Mojtaba
Publié: (2013)
Detecting and preventing unauthorised computer access on a physical network system
par: Mohd. Shariff, Muhammad Reza
Publié: (2008)
par: Mohd. Shariff, Muhammad Reza
Publié: (2008)
Online forum thread retrieval using data fusion
par: Abdullah Albahem, Ameer Tawfik
Publié: (2013)
par: Abdullah Albahem, Ameer Tawfik
Publié: (2013)
Credential purpose-based access control for personal data protection in web-based applications
par: Abdul Ghani, Norjihan
Publié: (2013)
par: Abdul Ghani, Norjihan
Publié: (2013)
Development of an access control model for web services applying XML-based approach
par: Movahednejad, Homa
Publié: (2009)
par: Movahednejad, Homa
Publié: (2009)
Detection and prevention of malicious of relational database management systems (RDBMS)
par: Mohammed Rashad Aldhoqm, Arafat
Publié: (2013)
par: Mohammed Rashad Aldhoqm, Arafat
Publié: (2013)
An artificial co-stimulation classifier for malicious API calls classification in portable executable malwares / Saman Mirza Abdulla
par: Abdulla, Saman Mirza
Publié: (2012)
par: Abdulla, Saman Mirza
Publié: (2012)
Online signature verification based on dynamic feature discriminators
par: Omar, Nazaruddin
Publié: (2009)
par: Omar, Nazaruddin
Publié: (2009)
Enhancing user authentication for cloud web-based application / Detar Beqo
par: Detar , Beqo
Publié: (2018)
par: Detar , Beqo
Publié: (2018)
Stroke-to-stroke matching in on-line signature verification
par: Ahmad Jaini, Azhar
Publié: (2010)
par: Ahmad Jaini, Azhar
Publié: (2010)
User value co-creation model for agile web development in Malaysia
par: Madi, Tameer
Publié: (2015)
par: Madi, Tameer
Publié: (2015)
Two-dimensional barcodes for hardcopy document integrity verification
par: Teoh, Chin Yew
Publié: (2008)
par: Teoh, Chin Yew
Publié: (2008)
Modeling activity diagram to colored petri net for validation and verification based on non functional parameters
par: Balagatabi, Hossein Nematzadeh
Publié: (2008)
par: Balagatabi, Hossein Nematzadeh
Publié: (2008)
An analysis on security awareness of social networks users
par: Darvishi, Mahdi
Publié: (2013)
par: Darvishi, Mahdi
Publié: (2013)
Online signature verification using probabilistic modeling and neural network
par: Mohamed Ahsan , Amin
Publié: (2010)
par: Mohamed Ahsan , Amin
Publié: (2010)
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
par: Nageswary , Gannapathy
Publié: (2002)
par: Nageswary , Gannapathy
Publié: (2002)
Modelling UML activity diagram to colored petri net for validation and verification based on non functional parameters
par: Balagatabi, Hossein Nematzadeh
Publié: (2008)
par: Balagatabi, Hossein Nematzadeh
Publié: (2008)
Offline signature verification using ordinal structure fuzzy logic and integrated features based on single signature
par: Abdulfattah, Ghassan Marwan
Publié: (2019)
par: Abdulfattah, Ghassan Marwan
Publié: (2019)
A model for validation and verification of disk imaging in computer forensic investigation
par: Palaniappan, P. Siva Shamala
Publié: (2009)
par: Palaniappan, P. Siva Shamala
Publié: (2009)
Collaborative-based decision making for web service composition using service level agreement negotiation and crowdsourcing
par: Sharifi, Mahdi
Publié: (2015)
par: Sharifi, Mahdi
Publié: (2015)
The underutilization factors of computerised accounting software among accountants
par: Nur Fatiha Na’aimah, Mohd Fauzi
Publié: (2022)
par: Nur Fatiha Na’aimah, Mohd Fauzi
Publié: (2022)
Fusion features ensembling models using Siamese convolutional neural network for kinship verification
par: Mohammed Ali, Al Muashi
Publié: (2021)
par: Mohammed Ali, Al Muashi
Publié: (2021)
Trusted reasoning-role-based access control for cloud computing environment
par: Abdul Rauf, Abdul Rauf
Publié: (2019)
par: Abdul Rauf, Abdul Rauf
Publié: (2019)
Hybrid features for detection of malicious user in YouTube
par: Sadoon, Omar Hadeb
Publié: (2017)
par: Sadoon, Omar Hadeb
Publié: (2017)
On the prevention of Cross-VM cache-based side channel attacks / Zakira Inayat
par: Zakira, Inayat
Publié: (2017)
par: Zakira, Inayat
Publié: (2017)
Web design attributes guideline to reinforce user trust, satisfaction, and loyalty for Malaysian university students / Ranjen Naidu Vasudiven
par: Ranjen Naidu , Vasudiven
Publié: (2021)
par: Ranjen Naidu , Vasudiven
Publié: (2021)
Web-Based Youth Forum Application (WBYFA)
par: Alksher, Mostafa Ahmed
Publié: (2008)
par: Alksher, Mostafa Ahmed
Publié: (2008)
OffSig-sinGAN: A deep learning-based image augmentation model for offline signature verification / Muhammad Muzaffar Hameed
par: Muhammad Muzaffar , Hameed
Publié: (2023)
par: Muhammad Muzaffar , Hameed
Publié: (2023)
Partial Verification Bias Correction In Diagnostic Accuracy Studies Using Propensity Score-Based Methods
par: Wan Mansor, Wan Nor Arifin
Publié: (2023)
par: Wan Mansor, Wan Nor Arifin
Publié: (2023)
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
par: Al-Zarqawee, Aws Naser
Publié: (2018)
par: Al-Zarqawee, Aws Naser
Publié: (2018)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
par: Abuadhmah, Najlaa Abdullah
Publié: (2010)
par: Abuadhmah, Najlaa Abdullah
Publié: (2010)
Prioritization-based adaptive emergency traffic medium access control protocol for wireless body area networks
par: Masud, Farhan
Publié: (2019)
par: Masud, Farhan
Publié: (2019)
Web Based Students' Attendance System (WSAS)
par: Al-Dmour, Ala Abdal-Gader Nemran
Publié: (2012)
par: Al-Dmour, Ala Abdal-Gader Nemran
Publié: (2012)
Web-based counselling system / Suvarna Supramaniam
par: Suvarna , Supramaniam
Publié: (2002)
par: Suvarna , Supramaniam
Publié: (2002)
Development of a Web Access Control Technique Based User Access Behavior
par: Abdelrahman, Selmaelsheikh
Publié: (2004)
par: Abdelrahman, Selmaelsheikh
Publié: (2004)
E-Accounting System / Gan Chaur Chan
par: Gan, Chaur Chan
Publié: (2003)
par: Gan, Chaur Chan
Publié: (2003)
Documents similaires
-
Alogrithm to prevent and detect insider multi transaction malicious activity in database
par: Khavidaki, Seyyed Mojtaba Dashti
Publié: (2013) -
Enhanced lexicon based models for extracting question-answer pairs from web forum
par: Obasa, Adekunle Isiaka
Publié: (2016) -
Hybrid web page prediction model for predicting user's next access
par: Chimphlee, Siriporn
Publié: (2011) -
Supervised machine learning approach for detection of malicious executables
par: Ahmed, Yahye Abukar
Publié: (2013) -
Algorithm to prevent and detect insider multi transaction malicious activity in database
par: Dashti Khavidaki, Seyyed Mojtaba
Publié: (2013)