The problem of shilling attacks detecting in e-commerce systems is considered. The purpose of such attacks is to artificially change the rating of individual goods or services by users in order to increase their sales. A method for detecting shilling attacks based on a comparison of weighted temporal rules for the processes of selecting objects with explicit and implicit feedback from users is proposed. Implicit dependencies are specified through the purchase of goods and services. Explicit feedback is formed through the ratings of these products. The temporal rules are used to describe hidden relationships between the choices of user groups at two consecutive time intervals. The method includes the construction of temporal rules for explicit and implicit feedback, their comparison, as well as the formation of an ordered subset of temporal rules that capture potential shilling attacks. The method imposes restrictions on the input data on sales and ratings, which must be ordered by time or have timestamps. This method can be used in combination with other approaches to detecting shilling attacks. Integration of approaches allows to refine and supplement the existing attack patterns, taking into account the latest changes in user priorities.
The problem of identifying shilling attacks, which are aimed at forming false ratings of objects in the recommender system, is considered. The purpose of such attacks is to include in the recommended list of items the goods specified by the attacking user. The recommendations obtained as a result of the attack will not correspond to customers' real preferences, which can lead to distrust of the recommender system and a drop in sales. The existing methods for detecting shilling attacks use explicit feedback from the user and are focused primarily on building patterns that describe the key characteristics of the attack. However, such patterns only partially take into account the dynamics of user interests. A method for detecting shilling attacks using implicit feedback is proposed by comparing the temporal description of user selection processes and ratings. Models of such processes are formed using a set of weighted temporal rules that define the relationship in time between the moments when users select a given object. The method uses time-ordered input data. The method includes the stages of forming sets of weighted temporal rules for describing sales processes and creating ratings, calculating a set of ratings for these processes, and forming attack indicators based on a comparison of the ratings obtained. The resulting signs make it possible to distinguish between nuke and push attacks. The method is designed to identify discrepancies in the dynamics of purchases and ratings, even in the absence of rating values at certain time intervals. The technique makes it possible to identify an approach to masking an attack based on a comparison of the rating values and the received attack indicators. When applied iteratively, the method allows to refine the list of profiles of potential attackers. The technique can be used in conjunction with pattern-oriented approaches to identifying shilling attacks
The article considers the ASEAN approach to regional integration, which is characterized by great flexibility. All members of the group who are unable to agree on a collective policy can pursue their own, trying to hide internal disputes in the international arena. The main stages of political and economic integration of the group, the factors that hindered its successful development at the beginning of its existence have been identified.The process of formation of the AFTA free trade zone, its strategic goal, spheres of development are described. It is determined that free trade allows ASEAN countries with a narrow domestic market to increase its volume and save in the long run due to the positive effect of scale. The Framework Agreement on the Establishment of the ASEAN Investment Zone was considered, its role and spheres of influence were determined. There is an increase in foreign investment in the economic sectors of the group, which were previously unavailable.The role of ASEAN as an informal leader in the formation of political and economic cooperation between the countries of the region in order to solve the most pressing problems in the field of economy and security is outlined. The advantages and disadvantages of the Regional Forum of the Association of Southeast Asian Nations on Security, which is the first ongoing mechanism to discuss security issues in the Asia-Pacific region to promote constructive dialogue, confidence-building measures in the region and development of preventive diplomacy to prevent possible conflicts. Noted the main activities of the Forum are the fight against terrorism and transnational crime, emergency response, non-proliferation and disarmament, maritime security. The effectiveness of ASEAN in the field of peacekeeping in the region in terms of the number of interstate and internal conflicts that occurred after the formation of the Association and the successful implementation of the group's policy of balancing between leading states in various integration structures and dialogues. It was determined that most of the disputes in the region remain unresolved, but do not enter the stage of open confrontation, which is fundamentally important for the development of the Association.
The article is devoted to such a topical topic as public-private partnership and its potential as a resource for the development of enterprising. The article examines the theoretical aspects of the interaction between the state and business in the modern world, and how they form the practical core of development. The authors identify the factors that determine the functioning of the interaction between the state and business in modern Russia on the basis of economic and political interest. It is concluded that the partnership between the state and business as a strategic resource for the development of entrepreneurial activity in modern Russia has a place to be. The authors of the article state that, despite a number of certain factors that have a negative impact, the development of the public-private partnership system takes place in a systematic way. The number of forms of implementation of public-private partnership projects in Russia is predominant in relation to foreign developed countries. The authors of the article state that despite the abundance of forms of implementation of public-private partnership projects in Russia, today there is a low level of support from the state and business for projects that are focused on mutual partnership, while it is possible to observe an increase in the number of projects in the countries of the European Union. The authors of the article conclude that the improvement of the public-private partnership system in Russia should be due to the implementation of systemic modernization changes in the socio-economic and political reality of the state. However, due to the current institutional uncertainty and the lack of clear answers to questions regarding the definition of models for the future of political relations in the medium and long term, plans for further improvement of public-private partnerships remain vague. In conclusion, the authors of the article summarize the conclusion that the establishment of partnership relations between the state and business is an important and systemic task of various parties of the political and economic system of the modern Russian Federation.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.