Cited By
View all- Morris K(2024)Deepfake Sockpuppets: The Toxic “Realities” of a Weaponised InternetGothic Nostalgia10.1007/978-3-031-43852-3_5(61-79)Online publication date: 31-Jan-2024
Publicly available software vulnerabilities and exploit codes are often utilized by malicious actors to launch cyberattack to vulnerable targets. Therefore, organizations not only need to update their software to the latest version, they need to do ...
This paper endeavors to explain how and why self-presentation can affect in-game purchase behavior in Fortnite. As one of the most popular battle royale games in the world, Fortnite employs a free-to-play business model but enjoys a high revenue by ...
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs. The performance of these defenses depends on the quality of the ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in