A review on social spam detection: Challenges, open issues, and future directions
Abstract Online Social Networks are perpetually evolving and used in plenteous
applications such as content sharing, chatting, making friends/followers, customer …
applications such as content sharing, chatting, making friends/followers, customer …
Detection of malicious social bots: A survey and a refined taxonomy
M Latah - Expert Systems with Applications, 2020 - Elsevier
Social bots represent a new generation of bots that make use of online social networks
(OSNs) as command and control (C&C) channels. Malicious social bots have been used as …
(OSNs) as command and control (C&C) channels. Malicious social bots have been used as …
Social network security: Issues, challenges, threats, and solutions
Social networks are very popular in today's world. Millions of people use various forms of
social networks as they allow individuals to connect with friends and family, and share …
social networks as they allow individuals to connect with friends and family, and share …
Attacking graph-based classification via manipulating the graph structure
Graph-based classification methods are widely used for security analytics. Roughly
speaking, graph-based classification methods include collective classification and graph …
speaking, graph-based classification methods include collective classification and graph …
{Back-Propagating} system dependency impact for attack investigation
Causality analysis on system auditing data has emerged as an important solution for attack
investigation. Given a POI (Point-Of-Interest) event (eg, an alert fired on a suspicious file …
investigation. Given a POI (Point-Of-Interest) event (eg, an alert fired on a suspicious file …
Random walk based fake account detection in online social networks
Online social networks are known to be vulnerable to the so-called Sybil attack, in which an
attacker maintains massive fake accounts (also called Sybils) and uses them to perform …
attacker maintains massive fake accounts (also called Sybils) and uses them to perform …
Friend or faux: Graph-based early detection of fake accounts on social networks
In this paper, we study the problem of early detection of fake user accounts on social
networks based solely on their network connectivity with other users. Removing such …
networks based solely on their network connectivity with other users. Removing such …
Using latent dirichlet allocation for automatic categorization of software
In this paper, we propose a technique called LACT for automatically categorizing software
systems in open-source repositories. LACT is based on latent Dirichlet Allocation, an …
systems in open-source repositories. LACT is based on latent Dirichlet Allocation, an …
Detecting fake accounts in online social networks at the time of registrations
Online social networks are plagued by fake information. In particu-lar, using massive fake
accounts (also called Sybils), an attacker can disrupt the security and privacy of benign …
accounts (also called Sybils), an attacker can disrupt the security and privacy of benign …
{DeepPhish}: Understanding user trust towards artificially generated profiles in online social networks
Fabricated media from deep learning models, or deepfakes, have been recently applied to
facilitate social engineering efforts by constructing a trusted social persona. While existing …
facilitate social engineering efforts by constructing a trusted social persona. While existing …