scispace - formally typeset
Search or ask a question

Answers from top 6 papers

More filters
Papers (6)Insight
This article argues that this is evident within military-themed video games, offering a mimetic analysis of the themes of violence, identity and space in Splinter Cell: Blacklist.
Since anti-tracking technology based on blacklists highly depends on the coverage of the blacklist database, these methods cannot generate high-quality blacklists.
Thus, the latest and newly deployed phishing websites; for example, zero-day phishing websites, cannot be detected by using these blacklist-based approaches.
The proposed system not only can incorporate different public blacklist of Botnet C&C, but also dynamically tracing the Botnet C&C behavior for expanding the blacklist in time.
Proceedings ArticleDOI
Leigh Metcalf, Jonathan M. Spring 
12 Oct 2015
26 Citations
These results suggest that each blacklist describes a distinct sort of malicious activity and that even merging all lists there is no global ground truth to acquire.
Proceedings ArticleDOI
12 Nov 2019
8 Citations
We develop an aggregated and filtered blacklist that is more than 150 times less bulky, and provides the same coverage as the union of the blacklists on Alexa top 5,000 websites.

See what other people are reading

Can graph curvature be used as a feature for anomaly detection in complex networks?
5 answers
Graph curvature can indeed be utilized as a feature for anomaly detection in complex networks. Various methods leverage graph attributes and structures to detect anomalies effectively, with some focusing on node outlier detection in attributed graphs. One approach involves using knowledge graph technology to extract graph feature parameters reflecting node and network characteristics, followed by a two-stage unsupervised anomaly analysis method for abnormal changes in these features. Graph neural networks (GNNs) have been extensively studied for anomaly detection, utilizing graph attributes and structures to score anomalies appropriately. These models have shown success in tasks like node classification and link prediction, making them valuable for detecting anomalies in graphs with non-conforming patterns.
Deploying antivirus and firewall software thwarts what percentage of cyberattacks?
5 answers
Deploying antivirus software and perimeter firewalls helps in thwarting a significant percentage of cyberattacks. According to the 2005 US FBI Computer Crime Survey, 84% of enterprises experienced attacks by worms or viruses despite having antivirus software, and 79% faced spyware penetration despite using perimeter firewalls. Additionally, the study by Fejrskov et al. suggests that DNS-based blacklists, commonly used for cybersecurity, only categorize less than 6% of the blacklisted flows as malicious, indicating their limited effectiveness in blocking cyber threats. Therefore, while antivirus software and firewalls provide essential protection, they do not guarantee complete immunity against cyberattacks due to the evolving nature of threats and the limitations of current cybersecurity measures.
What is the likelihood and severity of local competition to Haier in Qatar market?
5 answers
The likelihood and severity of local competition for Haier in the Qatar market can be influenced by various factors. Factors impacting competition intensity include the number of local suppliers, foreign competition, intellectual property protection, and research and development spending. Increased competitiveness in a market can lead to more severe or "shocking" types of attacks, as organizations seek to differentiate themselves. In the context of collusive behavior, firms in localized competition should avoid strategies with overly severe punishments, as they may not be effective, especially with large discount factors. Therefore, Haier in the Qatar market may face a mix of intense competition influenced by various factors, potentially leading to more aggressive market behaviors and strategic considerations.
Do autustic children play more computer games?
4 answers
Autistic children tend to engage more in playing computer games compared to their typically developing peers. Research indicates that children and adolescents with autism spectrum disorder (ASD) spend longer periods playing video games, with higher levels of gaming disorder symptoms observed. Additionally, autistic adolescents are reported to play video games as a hobby more frequently than their non-autistic counterparts. Motivations for playing video games, such as escapism and social interaction, have been found to predict the time spent gaming among individuals with autistic traits. Moreover, game-based e-learning interventions have been explored to improve social interaction skills in autistic children, highlighting the potential benefits of utilizing technology in enhancing communication and social skills. Overall, the data suggests that autistic children indeed exhibit a higher propensity for playing computer games.
How can gradient descent method be used to optimize RoughSet theory?
5 answers
The gradient descent method can be utilized to optimize Rough Set Theory by enhancing feature selection processes. By integrating optimization techniques like Genetic Algorithms, Particle Swarm Optimization, and Teaching Learning Based Optimization, Rough Set Theory can be made more efficient in finding optimal feature subsets. Additionally, the use of Ant Lion Optimization has been explored to find minimal reducts, improving the classification accuracy of selected features. Moreover, a novel approach combining Rough Sets with the Affinity Propagation clustering algorithm has been proposed to optimize a radial basis function neural network, demonstrating enhanced generalization capabilities compared to conventional methods. These methods collectively showcase how optimization algorithms can enhance the performance of Rough Set Theory in feature selection and classification tasks.
How are heartbeats used in horror?
5 answers
Heartbeats are utilized in horror scenarios to enhance the immersive experience and evoke fear emotions in players or viewers. Various studies have explored the use of heart rate data to personalize horror games, where machine learning algorithms predict sound and lighting effects based on the players' heart rates. Additionally, physiological information like pulse rate is employed to tailor fear-inducing experiences in horror games. In the realm of 3D digital films, a cross-modal display system has been proposed to amplify horror emotions by providing vibrotactile feedback resembling a heartbeat. Moreover, an Emotion Hacking Virtual Reality (EH-VR) system manipulates users' heartbeats to intensify scary VR encounters, demonstrating the use of false heartbeat frequencies to accelerate the horror experience.
How are heartbeat sounds used in horror?
5 answers
Heartbeat sounds are utilized in horror to induce fear and suspense by affecting the autonomic nervous system and cardiac physiology of individuals. Studies have explored the impact of horror sounds on electro-cardiac activity, revealing significant changes in heart rate and ECG signals when exposed to horror stimuli. Machine learning models like Gradient Boosted Tree Regression have been employed to detect horror-sound induced cardiac changes, showcasing their effectiveness in differentiating these alterations in ECG signals. Additionally, the use of auditory stimuli in horror games in Virtual Reality has been personalized based on subjects' heart rates, enhancing the horror aspect by adjusting sound and lighting effects accordingly. These findings highlight the intricate relationship between heartbeat sounds and horror experiences, emphasizing their role in eliciting physiological responses associated with fear.
Why was the united states alarmed when North Korea pulled out of NPT in 2003?
5 answers
The United States was alarmed when North Korea pulled out of the Nuclear Non-Proliferation Treaty (NPT) in 2003 due to the acute foreign policy problem it created, as North Korea's actions indicated a possible intent to openly produce nuclear weapons, posing a significant threat to global nonproliferation efforts. This move exacerbated tensions between the U.S. and North Korea, leading to concerns over the longer-term consequences for the global nonproliferation regime. Additionally, North Korea's history of clandestinely pursuing nuclear weapons development heightened international concerns, especially since countries like North Korea have been listed as state sponsors of terrorism, raising fears of nuclear weapons falling into the hands of terrorist organizations.
What is power system stability?
5 answers
Power system stability refers to the ability of a power system to maintain a steady state or quickly return to it after a disturbance. Various methods are employed to enhance power system stability, such as utilizing Power System Stabilizers (PSS) optimized with algorithms like Virus Particle Swarm Optimization (VEPSO). Predicting power system stability margins is crucial for ensuring stable operation, with methods like gradient lifting decision trees and data mining being proposed for accurate predictions. Synchronous stability, particularly in power electronic-based systems, is a critical aspect involving the synchronization of electrical rotation vectors between grid-tied equipment to ensure system stability. Additionally, employing FACT devices like the Static Synchronous Series Compensator (SSSC) with optimized damping controllers can effectively improve power system stability by mitigating inter-area oscillations.
What are the key factors to consider when designing an IoT-based system for optimizing industrial process efficiency?
5 answers
When designing an IoT-based system to optimize industrial process efficiency, key factors to consider include component selection for efficient IoT nodes, addressing challenges such as poor tuning, oscillating effects, and mechanical issues through IIoT integration and advanced intelligent controllers, utilizing algorithms like particle swarm and XGBoost for product design optimization, focusing on power consumption, service quality, security, and wireless channel modeling for IoT applications' performance. By integrating IoT technologies with advanced controllers, sophisticated algorithms, and real-time monitoring, industrial processes can achieve improved performance, reduced downtime, and enhanced efficiency, ultimately revolutionizing industrial process control and automation.
What are the linguistic patterns and techniques used by ChatGPT to create convincing phishing emails in Arabic?
5 answers
ChatGPT, despite its success in English, faces challenges in Arabic NLP tasks, being outperformed by specialized Arabic models. Phishing emails in Arabic leverage linguistic patterns to deceive recipients. A study proposed a model using NLP to differentiate between legitimate and phishing emails by analyzing Arabic email content based on blacklists of phishing words and sentences, achieving high accuracy in classification. Additionally, research on phishing email detection using NLP techniques highlights the importance of feature extraction, classification methods like SVMs, and common NLP techniques such as TF-IDF and word embeddings, with limited focus on Arabic phishing emails, indicating open research opportunities in this area.