|
|
|
Károly Héberger
Background: The development and application of machine learning (ML) methods have become so fast that almost nobody can follow their developments in every detail. It is no wonder that numerous errors and inconsistencies in their usage have also spread wi...
ver más
|
|
|
|
|
|
|
Qinyu Hu, Xiaomei Zhang, Fangqi Li, Zhushou Tang and Shilin Wang
Application marketplaces collect ratings and reviews from users to provide references for other consumers. Many crowdturfing activities abuse user reviews to manipulate the reputation of an app and mislead other consumers. To understand and improve the e...
ver más
|
|
|
|
|
|
|
Yucheng Huang, Rui Song, Fausto Giunchiglia and Hao Xu
The rapid development of online social media makes abuse detection a hot topic in the field of emotional computing. However, most natural language processing (NLP) methods only focus on linguistic features of posts and ignore the influence of users? emot...
ver más
|
|
|
|
|
|
|
Wan-Shiou Yang and San-Yih Hwang
Pág. 56 - 68
|
|
|
|
|
|
|
Steven Furnell,Aung Htike Phyo
In recent years the Internet connection has become a frequent point of attack for most organisations. However, the loss due to insider misuse is far greater than the loss due to external abuse. This paper focuses on the problem of insider misuse, the sca...
ver más
|
|
|
|
|
|
|
N. Bhana
AbstractThe objective of this study was to carry out an investigation into the abnormal return behaviour of a sample of 50 acquired companies on the Johannesburg Stock Exchange during the period 1976-1985. Insiders appear to take market positions on pros...
ver más
|
|
|
|