Understanding social networks from a multiagent perspective

Y Jiang, JC Jiang - IEEE Transactions on Parallel and …, 2013 - ieeexplore.ieee.org
Social networks have recently been widely explored in many fields; these networks are
composed of a set of autonomous social actors and the interaction relations among them …

Online social network security: a comparative review using machine learning and deep learning

C Kumar, TS Bharati, S Prakash - Neural Processing Letters, 2021 - Springer
In the present era, Online Social Networking has become an important phenomenon in
human society. However, a large section of users are not aware of the security and privacy …

Privacy and security issues in online social networks

S Ali, N Islam, A Rauf, IU Din, M Guizani… - Future Internet, 2018 - mdpi.com
The advent of online social networks (OSN) has transformed a common passive reader into
a content contributor. It has allowed users to share information and exchange opinions, and …

Diffusion in social networks: A multiagent perspective

Y Jiang, JC Jiang - IEEE Transactions on Systems, Man, and …, 2014 - ieeexplore.ieee.org
In recent years, significant attention has been paid to diffusion in social networks (SNs),
which is, factually, the collective behavior of a set of autonomous social actors for interacting …

Social media and cybercrimes

L Almadhoor, F Alserhani… - Turkish Journal of …, 2021 - search.proquest.com
Users can communicate with each other by posting multimedia materials such as audio, text,
photographs, video, animation, and graphics via a forum known as social media networking …

Frappe: detecting malicious facebook applications

MS Rahman, TK Huang, HV Madhyastha… - Proceedings of the 8th …, 2012 - dl.acm.org
With 20 million installs a day, third-party apps are a major reason for the popularity and
addictiveness of Facebook. Unfortunately, hackers have realized the potential of using apps …

A theoretical review of social media usage by cyber-criminals

P Patel, K Kannoorpatti, B Shanmugam… - 2017 International …, 2017 - ieeexplore.ieee.org
Social media plays an integral part in individual's everyday lives as well as for companies.
Social media brings numerous benefits in people's lives such as to keep in touch with close …

Measuring and mitigating oauth access token abuse by collusion networks

S Farooqi, F Zaffar, N Leontiadis, Z Shafiq - Proceedings of the 2017 …, 2017 - dl.acm.org
We uncover a thriving ecosystem of large-scale reputation manipulation services on
Facebook that leverage the principle of collusion. Collusion networks collect OAuth access …

Detecting malicious facebook applications

S Rahman, TK Huang, HV Madhyastha… - … ACM transactions on …, 2015 - ieeexplore.ieee.org
With 20 million installs a day, third-party apps are a major reason for the popularity and
addictiveness of Facebook. Unfortunately, hackers have realized the potential of using apps …

Detecting cloning attack in Social Networks using classification and clustering techniques

S Kiruthiga, A Kannan - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Social Networks (SN) are popular among the people to interact with their friends through the
internet. Users spending their time in popular social networking sites like facebook, Myspace …