Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–3 of 3 results for author: Paradise, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.11424  [pdf, ps, other

    cs.DM cs.CL math.CO math.PR

    Metric Dimension and Resolvability of Jaccard Spaces

    Authors: Manuel E. Lladser, Alexander J. Paradise

    Abstract: A subset of points in a metric space is said to resolve it if each point in the space is uniquely characterized by its distance to each point in the subset. In particular, resolving sets can be used to represent points in abstract metric spaces as Euclidean vectors. Importantly, due to the triangle inequality, points close by in the space are represented as vectors with similar coordinates, which… ▽ More

    Submitted 27 June, 2024; v1 submitted 18 May, 2024; originally announced May 2024.

    Comments: 13 pages, 1 table

    MSC Class: 05C12; 60C05; 68R05; 68R12; 46B85; 33D90; 68T50 ACM Class: G.2; G.3; E.4; G.2.1; G.2.2

  2. arXiv:2001.05668  [pdf, other

    cs.SI

    The Chameleon Attack: Manipulating Content Display in Online Social Media

    Authors: Aviad Elyashar, Sagi Uziel, Abigail Paradise, Rami Puzis

    Abstract: Online social networks (OSNs) are ubiquitous attracting millions of users all over the world. Being a popular communication media OSNs are exploited in a variety of cyber attacks. In this article, we discuss the Chameleon attack technique, a new type of OSN-based trickery where malicious posts and profiles change the way they are displayed to OSN users to conceal themselves before the attack or av… ▽ More

    Submitted 24 January, 2020; v1 submitted 16 January, 2020; originally announced January 2020.

  3. arXiv:1807.00125  [pdf

    cs.SI

    Generation of Automatic and Realistic Artificial Profiles

    Authors: Abigail Paradise, Dvir Cohen, Asaf Shabtai, Rami Puzis

    Abstract: Online social networks (OSNs) are abused by cyber criminals for various malicious activities. One of the most effective approaches for detecting malicious activity in OSNs involves the use of social network honeypots - artificial profiles that are deliberately planted within OSNs in order to attract abusers. Honeypot profiles have been used in detecting spammers, potential cyber attackers, and adv… ▽ More

    Submitted 30 June, 2018; originally announced July 2018.