摘要:
User login information submitted as part of an attempt to log into a computer system is evaluated for unauthorized or illegitimate use based on indicators of suspicious behavior. Example indicators of suspicious behavior include whether the login information is known to have been compromised, whether the login attempt originates from a network source or a physical source that has previously originated an attempt to log in using login information known to have been compromised, and whether multiple login attempts using the login information from multiple users has originated from the source. A suspicion index can be calculated based on the presence of the indicators of suspicious behavior. The system can require enhanced authentication based on the measurement of suspicious behavior.
摘要:
User login information submitted as part of an attempt to log into a computer system is evaluated for unauthorized or illegitimate use based on indicators of suspicious behavior. Example indicators of suspicious behavior include whether the login information is known to have been compromised, whether the login attempt originates from a network source or a physical source that has previously originated an attempt to log in using login information known to have been compromised, and whether multiple login attempts using the login information from multiple users has originated from the source. A suspicion index can be calculated based on the presence of the indicators of suspicious behavior. The system can require enhanced authentication based on the measurement of suspicious behavior.
摘要:
A novel zeolite, NU-87 has in its "as-prepared" form an X-ray diffraction pattern including the lines given in Table 1. It is prepared from a reaction mixture containing sources of silica, a polymethylene alpha, omega-diammonium cation and optionally sources of alumina and metal oxide.
摘要:
Selective and controlled dealumination of an aluminosilicate zeolite is achieved by filling the pore system of the zeolite with a foreign material, for example coke, removing part of the foreign material from the outer portion of the zeolite, for example by heating in a gas stream comprising oxygen, dealuminating the outer portion, and then removing the remainder of the foreign material. Use of such a partially dealuminated zeolite as catalyst in a toluene disproportionation reaction leads to greater selectivity to paraxylene.
摘要:
To allow for detection of links to spam within a social networking system by identifying entities based on uniform resource locators (URLs). Identifiers that include at least one parent entity identifier representing a parent entity and at least one child entity identifier representing a child entity are extracted from URLs. An identifier sequence including the at least one parent entity identifier is designated as an attributable sequence when the child entity accounts for a value of traffic received by the parent entity that does not satisfy a threshold. In an embodiment, the child entity may be identified as an actionable target. The URLs may be classified within a hierarchical structure based on the identifiers. The hierarchical structure may comprise at least one parent node representing the parent entity and at least one child node representing the child entity. The hierarchical structure may be a tree.
摘要:
Selective and controlled dealumination of an aluminosilicate zeolite is achieved by filling the pore system of the zeolite with a foreign material, for example coke, removing part of the foreign material from the outer portion of the zeolite, for example by heating in a gas stream comprising oxygen, dealuminating the outer portion, and then removing the remainder of the foreign material. Use of such a partially dealuminated zeolite as catalyst in a toluene disproportionation reaction leads to greater selectivity to paraxylene.
摘要:
Hydrocarbons e.g. toluene and oxyhydrocarbons e.g. methanol are converted to other hydrocarbons by being contacted under conversion conditions with a catalyst comprising zeolite Nu-5.