Articles published on Internet Relay Chat
Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
133 Search results
Sort by Recency
- Research Article
1
- 10.32996/ijels.2023.5.2.8
- May 22, 2023
- International Journal of English Language Studies
- Salih Mahdi Adai Al-Mamoory + 1 more
This study tries to investigate one type of synchronous online communication, which is Internet Relay Chat, in terms of conversational analysis, particularly turn-taking and adjacency pairs. Synchronous online communication can be viewed as a novel medium that combines spoken, written and electronic properties. There may be a direct causal link between the lack of coherence in synchronous online communication and its propensity for language play that leads to the conversational analysis of synchronous online communication, which is associated with a reduction of coherence, disruption of turn adjacency and phantom turn adjacency. In synchronous online communication, there is a difficulty in interpreting messages in their sequential context that arises from the fact that turn sequencing is partly user-controlled and partly system-controlled. This leads to disrupted turn-taking and adjacency pairs as other stands of conversation get inserted between their parts.
- Research Article
- 10.32996/ijllt.2022.5.12.20
- Dec 18, 2022
- International Journal of Linguistics, Literature and Translation
- Hussain Hameed Mayuuf + 1 more
This study is a quantitative-qualitative, descriptive study in one of the mediums of computer-mediated communication, CMC. It attempts to investigate some stylistic features in the medium of Internet Relay Chat IRC that are used by online chatters. The data of this study are gathered from open access chatrooms through screen shots. The number of screen shots that are used in the analyses is (30) screen shots. The findings reveal that chat systems allow chatters to use different stylistic features such as graphic features, orthographic features, discourse features, flaming, spamming, spoofing, trolling, and lurking. The most frequent features are orthographic features such as “abbreviation, acronyms and punctuation”. These features are widely used in internet relay chat to save time, effort and as economy expressions.
- Research Article
- 10.18090/samriddhi.v14spli02.19
- Jun 30, 2022
- SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology
- Abhijit Banubakode + 1 more
Social Computing is historically rooted in the concept of the 1940s Bush’s Memex; which also led to the advent of hypertext and consequently the World Wide Web. The journey from the 1940s to the present, where social computing is all-encompassing and pervasive, has seen a global shift in our perspective. It has moved from recognizing initially that computers can be used for communication, not just computation to text-based social interactions (bulletin board systems, Usenet, Internet Relay Chat, MUD games) and further to dynamic social interactions with content generation, feedback and more advanced HCI mediums. Research in this field is far and wide as it belongs to several theoretical disciplines, uses various technological infrastructures and has innumerable applications. To name a few areas where social computing is used – creation of Web 2.0 and tools, Entertainment software, Business sector and Forecasting. The thrust is essentially moving towards social intelligence now. The aim of this chapter is to understand the foundation of Social Computing; the present direction and to earmark possible research areas in the future.
- Research Article
- 10.55041/ijsrem12419
- May 7, 2022
- INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
- P Velmurugadass
Internet could be a major supply of spreading terrorist act through speeches and videos. Terrorist organizations use net particularly social networks to brain wash people and promote terrorist activities through provocative websites that inspire helpless individuals to affix terrorist organizations. Therefore, here we have a tendency to propose Associate in Nursing economical net data processing system to observe such net properties and flag them mechanically for human review. websites are created from hypertext mark-up language (Hypertext markup language). In numerous arrangements and have pictures, texts etc., intermixed on a single website. Here, we have a tendency to used data processing further as net mining to observe patterns and mine out matter info on websites. Here, we have a tendency to are victimization E-mail System to observe the unwanted messages that are additional prone to terrorist act and can send to the spam on to the recipient who is victimization the system. Despite the speedy increase of cyber threats, there has still been very little analysis into the foundations of the topic or methodologies that would serve to guide info systems researchers and practitioners UN agency touch upon cybersecurity. additionally, very little is thought regarding crime- as-a-service (CaaS), a criminal business model that underpins the crime underground. This analysis gap and also the sensible cybercrime issues we have a tendency to face have impelled North American nation to research the crime underground economy by taking an information analytics approach from a style science perspective. to realize this goal, we: (1) propose a data analysis framework for analyzing the crime underground; (2) propose CaaS and crimeware definitions; (3) propose Associate in Nursing associated classification model, Associate in Nursingd (4) develop an example application to demonstrate however the planned framework and classification model might be enforced in apply. We then use this application to research the crime underground economy by analyzing an oversized knowledge set obtained from the net hacking community. By taking a style science analysis approach, this paper contributes to the planning of the email phishing in the area of cybercrime and the area is to fulfill the data security to the email messages consisting the data and providing them the security using the naïve bayes to planning the International Journal of Scientific Research in Engineering and Management (IJSREM) Volume: 06 Issue: 05 | May - 2022 Impact Factor: 7.185 ISSN: 2582-3930 © 2022, IJSREM | www.ijsrem.com DOI: 10.55041/IJSREM12419 | Page 2 industries will harden attacks by the crime underground. Among these, one of the attack is the email phishing. Keywords: CAAS (Crimeware-as-a-Service), ICMP (Internet Control Message Protocol), IRC (Internet Relay Chat), MIB (Management Information Base), CVE (Common Vulnerabilities and Exposures).
- Research Article
- 10.29210/07essr156000
- Apr 18, 2022
- Education and Social Sciences Review
- Skolastika Hapsari + 3 more
<span id="docs-internal-guid-eed4d6f8-7fff-4a7d-35d4-9ba500c2d575"><span>Everyone has problems and complaints that they faces. However, not everyone can easily share their complaints and feelings with others because of various factors that bother them. AMICO is an interactive website that the author created to help those who want to share their problems and even their works in a forum that allows anonymity. This study aims to see how much young people are interested in using AMICO and the impression they give after using AMICO. In this study using a quantitative approach and using the method of action. Data retrieval was carried out using a Google Form containing questions about the Amico website itself, both from the features provided, the design used, and others. The distribution of Google Forms is carried out via Internet Relay Chat (WhatsApp) and social media (Instagram). The number of respondents was 35 people with an age range of 15 to 25 years. The results showed that most of the testees considered the AMICO website to be innovative and Amico is a good medium of sharing their issues and their works.</span></span>
- Research Article
18
- 10.1016/j.chb.2022.107211
- Jan 31, 2022
- Computers in Human Behavior
- Seung Woo Chae + 1 more
Sharing emotion while spectating video game play: Exploring Twitch users' emotional change after the outbreak of the COVID-19 pandemic
- Research Article
3
- 10.5204/mcj.1864
- Nov 14, 2021
- M/C Journal
- Cynthia Campbell + 1 more
Familiars in a Strange Land
- Research Article
- 10.22501/jss.1233710
- May 2, 2021
- Journal of Sonic Studies
- Sarah Brown And Valentina Vuksic + 1 more
!Make Some Domestic Noise! was a series of collective online performances that took place during the first COVID-19 lockdown. They featured what might be described as an online domestic noise big band. As everyone was isolated at home, the ∏ Node collective launched the Antivirus program to train people on how to join and contribute their own stream and sounds. Being alone at home can be stressful, but it can also reveal the beauty of everyday noises. On a weekly basis, people were invited by email to participate by playing with the noises of their domestic appliances and live stream the results. These separate audio streams were then mixed in real time and sent to the main output stream. This was enabled by the ∏ Node site structure, which provides a volume control for every active stream. The website also has an Internet Relay Chat through which participants can, and did, directly interact.
- Research Article
11
- 10.1145/3409455
- Oct 15, 2020
- ACM Transactions on Management Information Systems
- Sicong Shao + 3 more
With the advances in Internet technologies and services, social media has been gained extreme popularity, especially because these technologies provide potential anonymity, which in turn harbors hacker discussion forums, underground markets, dark web, and so on. Internet relay chat (IRC) is a real-time communication protocol actively used by cybercriminals for hacking, cracking, and carding. Hence, it is particularly urgent to identify the authors of threat messages and malicious activities in IRC. Unfortunately, author identification studies in IRC remain as an underexplored area. In this research, we perform novel IRC text feature extraction methods and propose the first author attribution version of the deep forest (DF) model that is an ensemble of ensembles that utilizes the fusion of ensemble learning techniques. Our approach is supported by autonomic IRC monitoring. Experiments show that our approach is highly effective for author attribution and attains high accuracy even when the number of candidates is large while training data is limited.
- Research Article
- 10.18524/2307-4604.2020.1(44).211018
- Sep 2, 2020
- Writings in Romance-Germanic Philology
- Н В Реконвальд
The article deals with the pragmalinguistic research of English internet relay chat as a type of mass computer mediated communication in which disembodied distant interlocutors exchange text messages online. The main aim of this study is to identify the structural, formal and functional features of the English chat, which determines the corresponding research objectives: to describe chat-communication as the implementation of a phatic function in the language; to determine the specifics of its anthropocentre. Thus, the study focuses on one of the components of internet chat communication, namely, its anthropocentre. Chat communication is seen as polylogical interaction with different chatters initiating interaction technically on end. Our research found that phatic motivation and absence of face-to-face contact of chatters alongside with fast tempo of communication and short period of text product existence create its specific structural and language features. Chat communication is seen as a prototypical type of phatic computer mediated communication with the help of which chat users realize the playful behaviour impulse of communication, ambition to experience emotionally rich and carefree chatting. The research sample comprised chat logs that saw decency violation both in terms of topics discussed and modes of expression. Emotionally charged obscene vocabulary was vastly used in a number of chat logs, too. The research into the reasons of it showed that chatters resorted to obscene talk in order to get rid of emotional stress and psychological frustration. Chat discourse is largely composed of phatic and metacommunicative remarks where all chatters can enjoy the function of both the addresser and the addresee. A number of logs saw practically no exchange of factual information.
- Research Article
10
- 10.4018/ijcac.2020070102
- Jul 1, 2020
- International Journal of Cloud Applications and Computing
- Ahmad Al-Nawasrah + 3 more
A botnet refers to a set of compromised machines controlled distantly by an attacker. Botnets are considered the basis of numerous security threats around the world. Command and control (C&C) servers are the backbone of botnet communications, in which bots send a report to the botmaster, and the latter sends attack orders to those bots. Botnets are also categorized according to their C&C protocols, such as internet relay chat (IRC) and peer-to-peer (P2P) botnets. A domain name system (DNS) method known as fast-flux is used by bot herders to cover malicious botnet activities and increase the lifetime of malicious servers by quickly changing the IP addresses of the domain names over time. Several methods have been suggested to detect fast-flux domains. However, these methods achieve low detection accuracy, especially for zero-day domains. They also entail a significantly long detection time and consume high memory storage. In this survey, we present an overview of the various techniques used to detect fast-flux domains according to solution scopes, namely, host-based, router-based, DNS-based, and cloud computing techniques. This survey provides an understanding of the problem, its current solution space, and the future research directions expected.
- Research Article
- 10.5210/spir.v2019i0.11008
- Oct 31, 2019
- AoIR Selected Papers of Internet Research
- Maxigas + 1 more
Internet Studies scholarship tends to focus on new and hegemonic digital media, overlooking persistent uses of “older”, non-proprietary protocols and applications by some social groups who are key to configuring the nexus between technology and society. In response, we examine the contemporary political significance of using “old” social media through the empirical case of Internet Relay Chat (IRC) use. We advance a critique of platforms (closed, centralised, hegemonic social media) that we contrast with co-constructed devices that deeply involve users in their technological design and social construction. As a contemporary but long used online chat protocol, IRC serves as an important source for the critique of the currently hegemonic — but increasingly distrusted — infrastructures of computer-mediated communication. Drawing on Boltanski and Chiapello’s theory of critique and recuperation, we contrast the uses and underlying social norms of IRC with those of currently mainstream social media platforms. We claim that certain technical limitations that actors of IRC development did not feel necessary to address have kept it from incorporation into regimes of capital accumulation and social control, but also hindered its mass adoption. Ultimately, IRC continues to serve social groups key to the collaborative production of software, hardware and politics. While the general history of digital innovations illustrates the logic of critique and recuperation, our case study highlights the possibilities and pitfalls of resistance to it.
- Research Article
119
- 10.3390/app9112375
- Jun 11, 2019
- Applied Sciences
- Riaz Ullah Khan + 5 more
In recent years, the botnets have been the most common threats to network security since it exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been used to carry phishing links, to perform attacks and provide malicious services on the internet. It is challenging to identify Peer-to-peer (P2P) botnets as compared to Internet Relay Chat (IRC), Hypertext Transfer Protocol (HTTP) and other types of botnets because P2P traffic has typical features of the centralization and distribution. To resolve the issues of P2P botnet identification, we propose an effective multi-layer traffic classification method by applying machine learning classifiers on features of network traffic. Our work presents a framework based on decision trees which effectively detects P2P botnets. A decision tree algorithm is applied for feature selection to extract the most relevant features and ignore the irrelevant features. At the first layer, we filter non-P2P packets to reduce the amount of network traffic through well-known ports, Domain Name System (DNS). query, and flow counting. The second layer further characterized the captured network traffic into non-P2P and P2P. At the third layer of our model, we reduced the features which may marginally affect the classification. At the final layer, we successfully detected P2P botnets using decision tree Classifier by extracting network communication features. Furthermore, our experimental evaluations show the significance of the proposed method in P2P botnets detection and demonstrate an average accuracy of 98.7%.
- Research Article
- 10.1525/jpms.2019.311007
- Mar 1, 2019
- Journal of Popular Music Studies
- Rebekah Farrugia
The mid 1990s was a turning point in my life. Within a year I discovered the Internet and rave culture. I started spending as much time as possible in Internet Relay Chat rooms, reading listserv emails, listening to techno and house music, and attending raves on as many Saturday nights as possible.
- Research Article
- 10.5204/mcj.1463
- Dec 6, 2018
- M/C Journal
- Chris Campanioni
How Bizarre: The Glitch of the Nineties as a Fantasy of New Authorship
- Research Article
3
- 10.24843/mite.2017.v16i03p03
- Dec 29, 2017
- Majalah Ilmiah Teknologi Elektro
- Ni Luh Ratniasih + 2 more
The Internet has become something important in the communication development. One communication facilities on the Internet is the Internet relay chat or known as chat. Chat applications in real time is often misused for the purpose of spreading the virus, promotions, and other interests known as spam. Spamming is the sending of unwanted messages by someone who has a chat account. This causes the chat account feel uncomfortable with the condition. Based on these problems this research create a chat application that can filter messages or spam filtering by applying text mining. Spam filtering process can be done in two phases: text pre-processing and analyzing. These two phases are carried out to calculate the weight (W) of connectedness with the word spam messages. Based on the results of tests performed on chat applications by applying text mining to perform filtering on spam messages generate the level of accuracy of 91.41%.
- Research Article
14
- 10.7195/ri14.v15i2.1091
- Jul 1, 2017
- Revista ICONO14 Revista científica de Comunicación y Tecnologías emergentes
- Eduardo Salazar
Hashtags are an example of a Folksonomy, a term coined by Van der Val in 2004 to designate any label (or “tag”) that helps in the process of indexing and retrieval of online content. That said, the hash (#) symbol has a long heritage throughout the computer age. This paper makes an attempt to trace that history, since the hash was first used as a technology aid and towards its emergence as a new construct, the hashtag. It was first proposed openly by Chris Messina as simple means to “form groups” on Twitter, mirroring, in some ways, the way in which the # symbol was used on IRC (Internet Relay Chat) to designate “channels” themselves associated to specific topics and content exchange. The San Diego bushfires of October 2007 lead to an organic growth in the adoption of hashtags, growth that has not stopped since, making them ubiquitous in the current Internet age. Be as it may, the popularity of the hashtag made it also a vehicle to understand how information flows. Consequently, there is an incredibly rich literature explaining the mechanics of diffusion through social networks, opening, in the process, a new question: is that all for the hashtag? That’s a question we also attempt to answer by introducing a new construct: the “programmable hashtag” (or p#).
- Research Article
17
- 10.1515/sem-2015-0082
- Apr 20, 2017
- Semiotica
- Tim Grant
Abstract I describe and discuss a series of court cases that focus upon on decoding the meaning of slang terms. Examples include sexual slang used in a description by a child and an Internet Relay Chat containing a conspiracy to murder. I consider the task presented by these cases for the forensic linguist and the roles the linguist may assume in determining the meaning of slang terms for the Courts. These roles are identified as linguist as naïve interpreter, lexicographer, case researcher, and cultural mediator. Each of these roles is suggestive of different strategies that might be used from consulting formal slang dictionaries and less formal Internet sources, to collecting case specific corpora and examining all the extraneous material in a particular case. Each strategy is evaluated both in terms of the strength of evidence provided and its applicability to the forensic context.
- Research Article
- 10.5958/2249-5576.2017.00023.1
- Jan 1, 2017
- International Journal of Information Dissemination and Technology
- Prachi Garg + 1 more
This paper analyzed the security measures in the collaborative environment, identified widespread DDoS attack implements and surveyed the current trace back tools to suggestion the actual attacker. Nearly, the most popular fears in cooperative environment are entrance controller attacks, SQL injection attacks and implementation of malevolent software, object reusability, camouflaged attacks, inhaling, nosey, and denial-of-service attacks (DoS). The elementary obligation of network based resource allocation includes providing dependable and reliable access of local as well as remote resources in collaborative application. But DDoS attacks are coming in the way of success of such resource centers. DDoS attack architecture can be classified as agent handler model and internet relay chat (IRC) model.
- Research Article
- 10.51983/ajist-2016.6.2.133
- Nov 5, 2016
- Asian Journal of Information Science and Technology
- P K Paul + 1 more
The growth of internet has been started with properties of sharing of file and documents among the computers and similar systems. The www, email, News Group, FTP, Internet Relay Chat, Telnet, Voice Communication System lead the rapid growth of the internet services and its application resulted increase user base in almost all the countries around the world. The total internet users touches 40% of the total population in the world as far as 2014 is concerned. Surprisingly the developing world is also moving towards more internet services and user base. Europe Region touches the highest percentages (75%) of internet users among the other regions as reported by the International Telecommunication Union. The paper is highlighted the growing internet users around the world and many features and aspects in relation to this.