Skip to main content

Showing 1–4 of 4 results for author: Erhardt, K

.
  1. arXiv:2407.04350  [pdf, other

    cs.CR

    Temporal fingerprints: Identity matching across fully encrypted domain

    Authors: Shahar Somin, Keeley Erhardt, Alex 'Sandy' Pentland

    Abstract: Technological advancements have significantly transformed communication patterns, introducing a diverse array of online platforms, thereby prompting individuals to use multiple profiles for different domains and objectives. Enhancing the understanding of cross domain identity matching capabilities is essential, not only for practical applications such as commercial strategies and cybersecurity mea… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

  2. arXiv:2307.09834  [pdf, other

    cs.IR

    Who Provides the Largest Megaphone? The Role of Google News in Promoting Russian State-Affiliated News Sources

    Authors: Keeley Erhardt, Saurabh Khanna

    Abstract: The Internet has not only digitized but also democratized information access across the globe. This gradual but path-breaking move to online information propagation has resulted in search engines playing an increasingly prominent role in sha** access to human knowledge. When an Internet user enters a query, the search engine sorts through the hundreds of billions of possible webpages to determin… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

    Journal ref: The 9th International Conference on Computational Social Science (IC2S2). 2023

  3. Disambiguating Disinformation: Extending Beyond the Veracity of Online Content

    Authors: Keeley Erhardt, Alex Pentland

    Abstract: Following the 2016 US presidential election and the now overwhelming evidence of Russian interference, there has been an explosion of interest in the phenomenon of "fake news". To date, research on false news has centered around detecting content from low-credibility sources and analyzing how this content spreads across online platforms. Misinformation poses clear risks, yet research agendas that… ▽ More

    Submitted 26 June, 2022; originally announced June 2022.

    Comments: In Workshop Proceedings of the 15th International AAAI Conference on Web and Social Media (2021)

  4. arXiv:2201.06068  [pdf

    cs.CR cs.CY cs.NI cs.SI

    Zero Botnets: An Observe-Pursue-Counter Approach

    Authors: Jeremy Kepner, Jonathan Bernays, Stephen Buckley, Kenjiro Cho, Cary Conrad, Leslie Daigle, Keeley Erhardt, Vijay Gadepally, Barry Greene, Michael Jones, Robert Knake, Bruce Maggs, Peter Michaleas, Chad Meiners, Andrew Morris, Alex Pentland, Sandeep Pisharody, Sarah Powazek, Andrew Prout, Philip Reiner, Koichi Suzuki, Kenji Takahashi, Tony Tauber, Leah Walker, Douglas Stetson

    Abstract: Adversarial Internet robots (botnets) represent a growing threat to the safe use and stability of the Internet. Botnets can play a role in launching adversary reconnaissance (scanning and phishing), influence operations (upvoting), and financing operations (ransomware, market manipulation, denial of service, spamming, and ad click fraud) while obfuscating tailored tactical operations. Reducing the… ▽ More

    Submitted 16 January, 2022; originally announced January 2022.

    Comments: 26 pages, 13 figures, 2 tables, 72 references, submitted to PlosOne

    Report number: Harvard Belfer Center Report (2021 June)