Zobrazeno 1 - 10
of 81
pro vyhledávání: '"Bogdan Carbunar"'
Publikováno v:
IEEE Access, Vol 5, Pp 15901-15912 (2017)
Industrial control systems are distributed hierarchical networks that share information via an assortment of communication protocols. Such systems are vulnerable to attacks that can cause disastrous consequences. This article focuses on time delay sw
Externí odkaz:
https://doaj.org/article/a927df30875d474ea11d61069495b6e1
Publikováno v:
IEEE Transactions on Knowledge and Data Engineering. 33:3648-3661
Search rank fraud, the fraudulent promotion of products hosted on peer-review sites, is driven by expert workers recruited online, often from crowdsourcing sites. In this paper we introduce the fraud de-anonymization problem, that goes beyond fraud d
Publikováno v:
Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing.
Autor:
Bogdan Carbunar, Sajedul Talukder
Publikováno v:
ACM Transactions on Social Computing. 3:1-34
Social networks like Facebook provide functionality that can expose users to abuse perpetrated by their contacts. For instance, Facebook users can often access sensitive profile information and timeline posts of their friends and also post abuse on t
Autor:
Rabimba Karanjai, Lei Xu, Zhimin Gao, Lin Chen, Keshav Kasichainula, Bogdan Carbunar, Weidong Shi
Publikováno v:
SSRN Electronic Journal.
Online app search optimization (ASO) platforms that provide bulk installs and fake reviews for paying app developers in order to fraudulently boost their search rank in app stores, were shown to employ diverse and complex strategies that successfully
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6913af9e7368e96cc2ce2f2a5312e04c
http://arxiv.org/abs/2111.10400
http://arxiv.org/abs/2111.10400
Autor:
Bogdan Carbunar, Ruben Recabarren
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2022, Iss 1, Pp 207-226 (2022)
Providing unrestricted access to sensitive content such as news and software is difficult in the presence of adaptive and resourceful surveillance and censoring adversaries. In this paper we leverage the distributed and resilient nature of commercial
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e8531e3ab5a7a71ae49a3216d0246d11
http://arxiv.org/abs/2110.08422
http://arxiv.org/abs/2110.08422
Autor:
Bogdan Carbunar, Lin Chen, Weidong Shi, Lei Xu, Keshav Kasichainula, Miguel Claudio Fernandez, Zhimin Gao
Publikováno v:
SAC
Bitcoin introduces a new type of cryptocurrency that does not rely on a central system to maintain transactions. Inspired by the success of Bitcoin, all types of alt cryptocurrencies were invented in recent years. Some of the new cryptocurrencies foc
Publikováno v:
IEEE Transactions on Knowledge and Data Engineering. 29:1329-1342
Fraudulent behaviors in Google Play, the most popular Android app market, fuel search rank abuse and malware proliferation. To identify malware, previous work has focused on app executable and permission analysis. In this paper, we introduce FairPlay
Publikováno v:
CCS
Black Hat App Search Optimization (ASO) in the form of fake reviews and sockpuppet accounts, is prevalent in peer-opinion sites, e.g., app stores, with negative implications on the digital and real lives of their users. To detect and filter fraud, a