Detection of bots in social media: a systematic review

M Orabi, D Mouheb, Z Al Aghbari, I Kamel - Information Processing & …, 2020 - Elsevier
Social media bots (automated accounts) attacks are organized crimes that pose potential
threats to public opinion, democracy, public health, stock market and other disciplines. While …

Malicious accounts: Dark of the social networks

KS Adewole, NB Anuar, A Kamsin, KD Varathan… - Journal of Network and …, 2017 - Elsevier
Over the last few years, online social networks (OSNs), such as Facebook, Twitter and
Tuenti, have experienced exponential growth in both profile registrations and social …

Practical evasion of a learning-based classifier: A case study

N Šrndić, P Laskov - 2014 IEEE symposium on security and …, 2014 - ieeexplore.ieee.org
Learning-based classifiers are increasingly used for detection of various forms of malicious
data. However, if they are deployed online, an attacker may attempt to evade them by …

Empirical evaluation and new design for fighting evolving twitter spammers

C Yang, R Harkreader, G Gu - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
To date, as one of the most popular online social networks (OSNs), Twitter is paying its dues
as more and more spammers set their sights on this microblogging site. Twitter spammers …

Using sentiment to detect bots on twitter: Are humans more opinionated than bots?

JP Dickerson, V Kagan… - 2014 IEEE/ACM …, 2014 - ieeexplore.ieee.org
In many Twitter applications, developers collect only a limited sample of tweets and a local
portion of the Twitter network. Given such Twitter applications with limited data, how can we …

Twitter spam detection: Survey of new approaches and comparative study

T Wu, S Wen, Y **ang, W Zhou - Computers & Security, 2018 - Elsevier
Twitter spam has long been a critical but difficult problem to be addressed. So far,
researchers have proposed many detection and defence methods in order to protect Twitter …

Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter

C Yang, R Harkreader, J Zhang, S Shin… - Proceedings of the 21st …, 2012 - dl.acm.org
In this paper, we perform an empirical analysis of the cyber criminal ecosystem on Twitter.
Essentially, through analyzing inner social relationships in the criminal account community …

[PDF][PDF] Compa: Detecting compromised accounts on social networks.

M Egele, G Stringhini, C Kruegel, G Vigna - NDSS, 2013 - ucl.ac.uk
As social networking sites have risen in popularity, cyber-criminals started to exploit these
sites to spread malware and to carry out scams. Previous work has extensively studied the …

Towards detecting compromised accounts on social networks

M Egele, G Stringhini, C Kruegel… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Compromising social network accounts has become a profitable course of action for
cybercriminals. By hijacking control of a popular media or business account, attackers can …

[PDF][PDF] Towards online spam filtering in social networks.

H Gao, Y Chen, K Lee, D Palsetia, AN Choudhary - NDSS, 2012 - ndss-symposium.org
Online social networks (OSNs) are extremely popular among Internet users. Unfortunately,
in the wrong hands, they are also effective tools for executing spam campaigns. In this …