Securing Online Name System through Trust Demonstrating and Temporal Analysis
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 8)Publication Date: 2014-08-30
Authors : Chandana Krishna Sivunigunta; Sudha.K;
Page : 631-637
Keywords : Information security; social network; information filtering;
Abstract
Using the fast growth involving status methods in various online networks, manipulations towards this kind of methods are evolving easily. Because of the anonymity with the World-wide-web, it's very hard regarding regular customers to evaluate any stranger’s stability and good quality that makes on the web interactions dangerous. In this particular cardstock, we offer program TATA, the particular abbreviation involving shared Temporary and Rely on Research, which shields status methods from your fresh viewpoint: the particular combined time period domain anomaly recognition and Dempster?Shafer theory-based trust working out. Sixty how a on the web participants guard themselves by judging the grade of unknown people or maybe unfamiliar products previously. To cope with this problem, on the web status methods are already piled up. This objective is always to generate large-scale digital word-of-mouth sites where by people talk about ideas and encounters, regarding reviews and scores, upon a variety of products, as well as solutions, services, digital articles and in some cases others. We offer a difference detector inside TATA because anomaly detector, which normally takes the particular rating sequences as advices and picks up modifications developing inside the rating sequences. This recommended alter detector will probably diagnose not only sudden fast modifications but also modest modifications accumulated with time. Like this, even if malicious customers put in shady scores using modest shifts in order to little by little deceive items’ status results, this kind of kind of modifications will still be accumulated and finally end up being found by the recommended alter detector.
Other Latest Articles
- Designing of Circular and Square Microstrip Feed Antennas?
- An Enhanced Image Steganography Technique in Art Images?
- Design and Implementation of Power Efficient Turbo Decoder?
- Is the harmony of the legislation achievable? Reviewof the dis?sertation by M.A. Pshenichnov ?Harmonization of the Russian legislation (theory, practice, technique)?
- Offenders and Victims of Violent Crime: Study to Unreported Crime of Juveniles
Last modified: 2014-08-31 19:52:57